diff --git a/404.html b/404.html index 867411076..a4fe111d6 100644 --- a/404.html +++ b/404.html @@ -320,7 +320,7 @@
  • - + @@ -340,11 +340,11 @@
  • - + - How Patcher Works + About Patcher diff --git a/about/conventions/index.html b/about/conventions/index.html index f1fd4b34a..d1a2bf5f3 100644 --- a/about/conventions/index.html +++ b/about/conventions/index.html @@ -342,7 +342,7 @@
  • - + @@ -362,11 +362,11 @@
  • - + - How Patcher Works + About Patcher @@ -907,7 +907,7 @@

    - 2024-08-08 + 2024-08-08 diff --git a/about/license/index.html b/about/license/index.html index 54ce3153e..90428dc46 100644 --- a/about/license/index.html +++ b/about/license/index.html @@ -11,7 +11,7 @@ - + @@ -342,7 +342,7 @@
  • - + @@ -362,11 +362,11 @@
  • - + - How Patcher Works + About Patcher @@ -700,7 +700,7 @@

    License - 2024-08-08 + 2024-08-08 @@ -774,7 +774,7 @@

    License - + diff --git a/about/tags/index.html b/about/tags/index.html index 14a4b4c16..a372f1cb5 100644 --- a/about/tags/index.html +++ b/about/tags/index.html @@ -342,7 +342,7 @@
  • - + @@ -362,11 +362,11 @@
  • - + - How Patcher Works + About Patcher @@ -620,6 +620,15 @@ +
  • + +
  • + + + info + + +
  • @@ -700,6 +709,15 @@ +

  • + +
  • + + + info + + +
  • @@ -743,6 +761,11 @@

    home
  • Home
  • +

    info

    +


    @@ -768,7 +791,7 @@

    home - 2024-08-08 + 2024-08-08 diff --git a/about_csf/index.html b/about_csf/index.html new file mode 100644 index 000000000..10b773829 --- /dev/null +++ b/about_csf/index.html @@ -0,0 +1,1009 @@ + + + + + + + + + + + + + + + + + + + + + + + + + About CSF - CSF Firewall + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    + + + + Skip to content + + +
    +
    + + + +
    + + + + + + + + +
    + + +
    + +
    + + + + + + +
    +
    + + + +
    +
    +
    + + + + + +
    +
    +
    + + + +
    +
    +
    + + + +
    +
    +
    + + + +
    +
    + + + + + + + + + + + + + + + + + + + + + + + +

    About ConfigServer Firewall

    +

    ConfigServer Firewall, also known as CSF, is a Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security application for Linux servers. CSF provides better security for your server while giving you an advanced, easy to use interface for managing firewall settings. CSF configures your server’s firewall to lock down public access to services and only allow certain connections, such as logging in to FTP, checking email, or loading websites.

    +

    ConfigServer Firewall also comes with a service called Login Failure Daemon, or LFD. LFD watches your user activity for excessive login failures which are commonly seen during brute force attacks. If a large number of login failures are seen coming from the same IP address, that IP will immediately be temporarily blocked from all services on your server. These IP blocks will automatically expire, however they can be removed manually through the ConfigServer interface in WebHost Manager. In addition to removing IPs, CSF also allows you to manually whitelist or blacklist IPs in your firewall, as well as real-time monitoring for automatic IP blocks in LFD. Configuration details are covered in Managing Your CSF Firewall.

    +


    +
    +
    +
    +
    +
    +
    + +
    +
    +
    + +
    +
    +
    + +


    +

    A partial list of ConfigServer Firewall features are outlined below.

    +


    +
      +
    • Straight-forward SPI iptables firewall script
    • +
    • Daemon process that checks for login authentication failures for:
        +
      • Courier imap, Dovecot, uw-imap, Kerio
      • +
      • openSSH
      • +
      • cPanel, WHM, Webmail (cPanel servers only)
      • +
      • Pure-ftpd, vsftpd, Proftpd
      • +
      • Password protected web pages (htpasswd)
      • +
      • Mod_security failures (v1 and v2)
      • +
      • Suhosin failures
      • +
      • Exim SMTP AUTH
      • +
      • Custom login failures with separate log file and regular expression matching
      • +
      +
    • +
    • POP3/IMAP login tracking to enforce logins per hour
    • +
    • SSH login notification
    • +
    • SU login notification
    • +
    • Excessive connection blocking
    • +
    • UI Integration for cPanel, DirectAdmin, InterWorx, CentOS Web Panel (CWP), VestaCP, CyberPanel - and Webmin
    • +
    • Easy upgrade between versions from within the control panel
    • +
    • Easy upgrade between versions from shell
    • +
    • Pre-configured to work on a cPanel server with all the standard cPanel ports open
    • +
    • Pre-configured to work on a DirectAdmin server with all the standard DirectAdmin ports open
    • +
    • Auto-configures the SSH port if it’s non-standard on installation
    • +
    • Block traffic on unused server IP addresses – helps reduce the risk to your server
    • +
    • Alert when end-user scripts sending excessive emails per hour – for identifying spamming scripts
    • +
    • Suspicious process reporting – reports potential exploits running on the server
    • +
    • Excessive user processes reporting
    • +
    • Excessive user process usage reporting and optional termination
    • +
    • Suspicious file reporting – reports potential exploit files in /tmp and similar directories
    • +
    • Directory and file watching – reports if a watched directory or a file changes
    • +
    • Block traffic on a variety of Block Lists including DShield Block List and Spamhaus DROP List
    • +
    • BOGON packet protection
    • +
    • Pre-configured settings for Low, Medium or High firewall security (cPanel servers only)
    • +
    • Works with multiple ethernet devices
    • +
    • Server Security Check – Performs a basic security and settings check on the server (via cPanel/- DirectAdmin/Webmin UI)
    • +
    • Allow Dynamic DNS IP addresses – always allow your IP address even if it changes whenever you connect to the internet
    • +
    • Alert sent if server load average remains high for a specified length of time
    • +
    • mod_security log reporting (if installed)
    • +
    • Email relay tracking – tracks all email sent through the server and issues alerts for excessive usage (cPanel servers only)
    • +
    • IDS (Intrusion Detection System) – the last line of detection alerts you to changes to system and application binaries
    • +
    • SYN Flood protection
    • +
    • Ping of death protection
    • +
    • Port Scan tracking and blocking
    • +
    • Permanent and Temporary (with TTL) IP blocking
    • +
    • Exploit checks
    • +
    • Account modification tracking – sends alerts if an account entry is modified, e.g. if the password is changed or the login shell
    • +
    • Shared syslog aware
    • +
    • Messenger Service – Allows you to redirect connection requests from blocked IP addresses to preconfigured text and html pages to inform the visitor that they have been blocked in the firewall. This can be particularly useful for those with a large user base and help process support requests more efficiently
    • +
    • Country Code blocking – Allows you to deny or allow access by ISO Country Code
    • +
    • Port Flooding Detection – Per IP, per Port connection flooding detection and mitigation to help block DOS attacks
    • +
    • WHM root access notification (cPanel servers only)
    • +
    • lfd Clustering – allows IP address blocks to be automatically propagated around a group of servers running lfd. It allows allows cluster-wide allows, removals and configuration changes
    • +
    • Quick start csf – deferred startup by lfd for servers with large block and/or allow lists
    • +
    • Distributed Login Failure Attack detection
    • +
    • Temporary IP allows (with TTL)
    • +
    • IPv6 Support with ip6tables
    • +
    • Integrated UI – no need for a separate Control Panel or Apache to use the csf configuration
    • +
    • Integrated support for cse within the Integrated UI
    • +
    • cPanel Reseller access to per reseller configurable options Unblock, Deny, Allow and Search IP address blocks
    • +
    • System Statistics – Basic graphs showing the performance of the server, e.g. Load Averages, CPU Usage, Memory Usage, etc
    • +
    • ipset support for large IP lists
    • +
    • Integrated with the CloudFlare Firewall
    • +
    • …lots more!
    • +
    +


    +
    +


    + + + + + + + + + + + + + + + + + + + + +
    +
    + + + +
    + + + +
    + + + +
    +
    +
    +
    + +
    + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/about_patcher/index.html b/about_patcher/index.html new file mode 100644 index 000000000..694db659a --- /dev/null +++ b/about_patcher/index.html @@ -0,0 +1,975 @@ + + + + + + + + + + + + + + + + + + + + + + + + + How this patcher works - CSF Firewall + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    + + + + Skip to content + + +
    +
    + + + +
    + + + + + + + + +
    + + +
    + +
    + + + + + + +
    +
    + + + +
    +
    +
    + + + + + +
    +
    +
    + + + +
    +
    +
    + + + +
    +
    +
    + + + +
    +
    + + + + + + + + + + + + + + + + + + + + + + + +

    How Patcher Works

    +

    This section is optional to read. It simply outlines what the patcher does from the time of execution to better explain what will be happening on your systen.

    +


    +
      +
    • Download all the files in the /patch folder to your system.
    • +
    • Set the install.sh file to be executable.
        +
      • sudo chmod +x install.sh
      • +
      +
    • +
    • Run the install.sh script
        +
      • sudo ./install.sh
      • +
      • The script will first check to see if you have ConfigServer Firewall and all of its prerequisites installed. It will install them if they are not installed. This includes:
          +
        • ConfigServer Firewall
        • +
        • ipset package
        • +
        • iptables / ip6tables package
        • +
        +
      • +
      • Two new files will be added:
          +
        • /usr/local/csf/bin/csfpre.sh
        • +
        • /usr/local/csf/bin/csfpost.sh
        • +
        +
      • +
      • The patches will then be moved onto your system in the locations:
          +
        • /usr/local/include/csf/post.d/docker.sh
        • +
        • /usr/local/include/csf/post.d/openvpn.sh
        • +
        +
      • +
      • The Docker patch will first check to ensure you have the following:
          +
        • Must have Docker installed
        • +
        • This script will NOT install docker. You must do that.
        • +
        • Must have a valid docker network adapter named docker* or br-*
        • +
        +
      • +
      • The OpenVPN patch will first check to ensure you have the following:
          +
        • Must have OpenVPN Server installed
        • +
        • Must have a valid network tunnel named tun* (tun0, tun1, etc)
        • +
        • Must have an outside network adapter named either eth* or enp*
        • +
        • If any of the checks above are not true, OpenVPN patcher will skip
        • +
        • You can check your list of network adapters using any of the commands below:
            +
          • ip link show
          • +
          • ifconfig
          • +
          +
        • +
        • You can check if OpenVPN server is installed by using the commmand:
            +
          • openvpn --version
          • +
          +
        • +
        +
      • +
      +
    • +
    +


    +
      +
    • If you attempt to run the install.sh any time after the initial setup:
        +
      • The script will check if ConfigServer Firewall and all prerequisites are installed.
          +
        • If they are not installed; they will be installed.
        • +
        • If they are already installed; nothing will happen. The script does NOT update your packages. It installs the latest version of each package from the time that you run the script and do not already have ConfigServer Firewall installed.
        • +
        +
      • +
      • The script will look at all of the files it added the first time and check the MD5 hash.
          +
        • If the csfpre, csfpost, or patch files do not exist; they will be re-added to your system.
        • +
        • If the patch files are different from the one the patcher comes with, you will be prompted / asked if you wish to overwrite your already installed copy
        • +
        • If the patch files are the same as the ones which comes with the patcher; nothing will be done and it will skip that step.
        • +
        +
      • +
      +
    • +
    +


    +
    +


    + + + + + + + + + + + + + + + + + + + + +
    +
    + + + +
    + + + +
    + + + +
    +
    +
    +
    + +
    + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/blog/index.html b/blog/index.html index 38d0f2e0d..5c6dcd6d4 100644 --- a/blog/index.html +++ b/blog/index.html @@ -338,7 +338,7 @@
  • - + @@ -358,11 +358,11 @@
  • - + - How Patcher Works + About Patcher diff --git a/changelog/index.html b/changelog/index.html index cc3c021d2..de9f4400f 100644 --- a/changelog/index.html +++ b/changelog/index.html @@ -340,7 +340,7 @@
  • - + @@ -360,11 +360,11 @@
  • - + - How Patcher Works + About Patcher @@ -801,7 +801,7 @@

    - 2024-08-08 + 2024-08-08 diff --git a/home/index.html b/home/index.html index 7f9a6c461..c07460521 100644 --- a/home/index.html +++ b/home/index.html @@ -12,7 +12,7 @@ - + @@ -343,7 +343,7 @@
  • - + @@ -363,11 +363,11 @@
  • - + - How Patcher Works + About Patcher @@ -705,7 +705,7 @@

    ConfigServer Firewall

    - 2024-08-08 + 2024-08-08 @@ -780,13 +780,13 @@

    ConfigServer Firewall

    -
    +
  • - + @@ -375,11 +375,11 @@

    ConfigServer Firewall

  • - + - How Patcher Works + About Patcher diff --git a/plugins/index.html b/plugins/index.html index fd4f169a0..36217744a 100644 --- a/plugins/index.html +++ b/plugins/index.html @@ -333,7 +333,7 @@
  • - + @@ -353,11 +353,11 @@
  • - + - How Patcher Works + About Patcher @@ -659,7 +659,7 @@

    Index

    - 2024-08-08 + 2024-08-08 diff --git a/search/search_index.json b/search/search_index.json index c626ca00e..b8c3af7fb 100644 --- a/search/search_index.json +++ b/search/search_index.json @@ -1 +1 @@ -{"config": {"lang": ["en"], "separator": "[\\s\\u200b\\-_,:!=\\[\\]()\"`/]+|\\.(?!\\d)|&[lg]t;|(?!\\b)(?=[A-Z][a-z])", "pipeline": ["stopWordFilter"]}, "docs": [{"location": "", "title": "ConfigServer Firewall", "text": "

    Welcome to the ConfigServer documentation

    "}, {"location": "changelog/", "title": "Changelog", "text": "", "tags": ["changelog"]}, {"location": "changelog/#2.0.0", "title": "2.0.0 Aug 07, 2024", "text": "
    • feat: add new patch openvpn
    • feat: add new command-line arguments:
      • add -d, --dev for advanced logging
      • add -f, --flush to completely remove iptable rules
      • add -r, --report to display dependency stats, app information, etc.
      • add -v, --version to display patcher version
    • enhance: docker patch now allows for multiple ip blocks to be whitelisted
    • refactor: re-write of script
    • refactor: merge all scripts into one
    • bug: fixed issue with manual mode being disabled - #1
    • bug: fixed error \"docker network inspect\" requires at least 1 argument. - #1
    • bug: fixed error invalid port/service '-j' error
    • docs: rewrite documentation to include better instructions
    • ci: add workflow to automatically grab latest version of ConfigServer Firewall and append to each release
    ", "tags": ["changelog"]}, {"location": "changelog/#1.0.0", "title": "1.0.0 Jun 06, 2024", "text": "
    • Initial release
    ", "tags": ["changelog"]}, {"location": "home/", "title": "Home", "text": "ConfigServer Firewall

    This documentation is related to the github repository for ConfigServer Firewall; a popular and powerful firewall solution for Linux servers. On top of documentation for the software itself; this repository includes added patches which allow you to seamlessly integrate Docker and OpenVPN server with ConfigServer Firewall so that all of the services can communicate between each other without interruption.

    This documentation covers the following:

    • Install, Configure & Manage CSF (ConfigServer Firewall)
    • Install CSF WebUI interface
    • Install patches
      • Docker Integration
      • OpenVPN Integration

    ", "tags": ["home"]}, {"location": "about/conventions/", "title": "Conventions", "text": "

    This documentation use some symbols for illustration purposes. Before you read on, please make sure you've made yourself familiar with the following list of conventions:

    "}, {"location": "about/conventions/#release-type", "title": "Release Type", "text": "The tag symbol in conjunction with a version number denotes when a specific feature or behavior was added. Make sure you're at least on this version if you want to use it.

    stable

    beta

    "}, {"location": "about/conventions/#default", "title": "Controls", "text": "These icons define what type of control a specified setting uses.

    toggle

    textbox

    dropdown

    button

    slider

    color wheel

    "}, {"location": "about/conventions/#default", "title": "Default Value", "text": "This defines what the default value for a setting is.

    Specified setting has a default value

    Specified setting has no default value and is empty

    "}, {"location": "about/conventions/#experimental", "title": "Experimental", "text": "

    Anything listed with this icon are features or functionality that are still in development and may change in future versions.

    "}, {"location": "about/conventions/#required", "title": "Required value", "text": "

    Items listed with this symbol indicate that they are required to be set.

    "}, {"location": "about/conventions/#customization", "title": "Customization", "text": "

    This symbol denotes that the item described is a customization which affects the overall look of the plugin.

    "}, {"location": "about/conventions/#utility", "title": "Utility", "text": "

    This symbol denotes that the item described is classified as something that changes the overall functionality of the plugin.

    "}, {"location": "about/license/", "title": "License", "text": "

    MIT License

    Copyright \u00a9 2024 Aetherinox

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the \"Software\"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

    "}, {"location": "blog/", "title": "Blog", "text": ""}, {"location": "about/tags/", "title": "Tags", "text": "

    Following is a list of relevant tags:

    "}, {"location": "about/tags/#changelog", "title": "changelog", "text": "
    • Changelog
    "}, {"location": "about/tags/#home", "title": "home", "text": "
    • Home
    "}]} \ No newline at end of file +{"config": {"lang": ["en"], "separator": "[\\s\\u200b\\-_,:!=\\[\\]()\"`/]+|\\.(?!\\d)|&[lg]t;|(?!\\b)(?=[A-Z][a-z])", "pipeline": ["stopWordFilter"]}, "docs": [{"location": "", "title": "ConfigServer Firewall", "text": "

    Welcome to the ConfigServer documentation

    "}, {"location": "about_csf/", "title": "About ConfigServer Firewall", "text": "

    ConfigServer Firewall, also known as CSF, is a Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security application for Linux servers. CSF provides better security for your server while giving you an advanced, easy to use interface for managing firewall settings. CSF configures your server\u2019s firewall to lock down public access to services and only allow certain connections, such as logging in to FTP, checking email, or loading websites.

    ConfigServer Firewall also comes with a service called Login Failure Daemon, or LFD. LFD watches your user activity for excessive login failures which are commonly seen during brute force attacks. If a large number of login failures are seen coming from the same IP address, that IP will immediately be temporarily blocked from all services on your server. These IP blocks will automatically expire, however they can be removed manually through the ConfigServer interface in WebHost Manager. In addition to removing IPs, CSF also allows you to manually whitelist or blacklist IPs in your firewall, as well as real-time monitoring for automatic IP blocks in LFD. Configuration details are covered in Managing Your CSF Firewall.

    ConfigServer Firewall Official Website A firewall configuration script created to provide better security for your server https://configserver.com/configserver-security-and-firewall/ https://configserver.com/configserver-security-and-firewall/

    A partial list of ConfigServer Firewall features are outlined below.

    • Straight-forward SPI iptables firewall script
    • Daemon process that checks for login authentication failures for:
      • Courier imap, Dovecot, uw-imap, Kerio
      • openSSH
      • cPanel, WHM, Webmail (cPanel servers only)
      • Pure-ftpd, vsftpd, Proftpd
      • Password protected web pages (htpasswd)
      • Mod_security failures (v1 and v2)
      • Suhosin failures
      • Exim SMTP AUTH
      • Custom login failures with separate log file and regular expression matching
    • POP3/IMAP login tracking to enforce logins per hour
    • SSH login notification
    • SU login notification
    • Excessive connection blocking
    • UI Integration for cPanel, DirectAdmin, InterWorx, CentOS Web Panel (CWP), VestaCP, CyberPanel - and Webmin
    • Easy upgrade between versions from within the control panel
    • Easy upgrade between versions from shell
    • Pre-configured to work on a cPanel server with all the standard cPanel ports open
    • Pre-configured to work on a DirectAdmin server with all the standard DirectAdmin ports open
    • Auto-configures the SSH port if it\u2019s non-standard on installation
    • Block traffic on unused server IP addresses \u2013 helps reduce the risk to your server
    • Alert when end-user scripts sending excessive emails per hour \u2013 for identifying spamming scripts
    • Suspicious process reporting \u2013 reports potential exploits running on the server
    • Excessive user processes reporting
    • Excessive user process usage reporting and optional termination
    • Suspicious file reporting \u2013 reports potential exploit files in /tmp and similar directories
    • Directory and file watching \u2013 reports if a watched directory or a file changes
    • Block traffic on a variety of Block Lists including DShield Block List and Spamhaus DROP List
    • BOGON packet protection
    • Pre-configured settings for Low, Medium or High firewall security (cPanel servers only)
    • Works with multiple ethernet devices
    • Server Security Check \u2013 Performs a basic security and settings check on the server (via cPanel/- DirectAdmin/Webmin UI)
    • Allow Dynamic DNS IP addresses \u2013 always allow your IP address even if it changes whenever you connect to the internet
    • Alert sent if server load average remains high for a specified length of time
    • mod_security log reporting (if installed)
    • Email relay tracking \u2013 tracks all email sent through the server and issues alerts for excessive usage (cPanel servers only)
    • IDS (Intrusion Detection System) \u2013 the last line of detection alerts you to changes to system and application binaries
    • SYN Flood protection
    • Ping of death protection
    • Port Scan tracking and blocking
    • Permanent and Temporary (with TTL) IP blocking
    • Exploit checks
    • Account modification tracking \u2013 sends alerts if an account entry is modified, e.g. if the password is changed or the login shell
    • Shared syslog aware
    • Messenger Service \u2013 Allows you to redirect connection requests from blocked IP addresses to preconfigured text and html pages to inform the visitor that they have been blocked in the firewall. This can be particularly useful for those with a large user base and help process support requests more efficiently
    • Country Code blocking \u2013 Allows you to deny or allow access by ISO Country Code
    • Port Flooding Detection \u2013 Per IP, per Port connection flooding detection and mitigation to help block DOS attacks
    • WHM root access notification (cPanel servers only)
    • lfd Clustering \u2013 allows IP address blocks to be automatically propagated around a group of servers running lfd. It allows allows cluster-wide allows, removals and configuration changes
    • Quick start csf \u2013 deferred startup by lfd for servers with large block and/or allow lists
    • Distributed Login Failure Attack detection
    • Temporary IP allows (with TTL)
    • IPv6 Support with ip6tables
    • Integrated UI \u2013 no need for a separate Control Panel or Apache to use the csf configuration
    • Integrated support for cse within the Integrated UI
    • cPanel Reseller access to per reseller configurable options Unblock, Deny, Allow and Search IP address blocks
    • System Statistics \u2013 Basic graphs showing the performance of the server, e.g. Load Averages, CPU Usage, Memory Usage, etc
    • ipset support for large IP lists
    • Integrated with the CloudFlare Firewall
    • \u2026lots more!

    ", "tags": ["info"]}, {"location": "about_patcher/", "title": "How Patcher Works", "text": "

    This section is optional to read. It simply outlines what the patcher does from the time of execution to better explain what will be happening on your systen.

    • Download all the files in the /patch folder to your system.
    • Set the install.sh file to be executable.
      • sudo chmod +x install.sh
    • Run the install.sh script
      • sudo ./install.sh
      • The script will first check to see if you have ConfigServer Firewall and all of its prerequisites installed. It will install them if they are not installed. This includes:
        • ConfigServer Firewall
        • ipset package
        • iptables / ip6tables package
      • Two new files will be added:
        • /usr/local/csf/bin/csfpre.sh
        • /usr/local/csf/bin/csfpost.sh
      • The patches will then be moved onto your system in the locations:
        • /usr/local/include/csf/post.d/docker.sh
        • /usr/local/include/csf/post.d/openvpn.sh
      • The Docker patch will first check to ensure you have the following:
        • Must have Docker installed
        • This script will NOT install docker. You must do that.
        • Must have a valid docker network adapter named docker* or br-*
      • The OpenVPN patch will first check to ensure you have the following:
        • Must have OpenVPN Server installed
        • Must have a valid network tunnel named tun* (tun0, tun1, etc)
        • Must have an outside network adapter named either eth* or enp*
        • If any of the checks above are not true, OpenVPN patcher will skip
        • You can check your list of network adapters using any of the commands below:
          • ip link show
          • ifconfig
        • You can check if OpenVPN server is installed by using the commmand:
          • openvpn --version

    • If you attempt to run the install.sh any time after the initial setup:
      • The script will check if ConfigServer Firewall and all prerequisites are installed.
        • If they are not installed; they will be installed.
        • If they are already installed; nothing will happen. The script does NOT update your packages. It installs the latest version of each package from the time that you run the script and do not already have ConfigServer Firewall installed.
      • The script will look at all of the files it added the first time and check the MD5 hash.
        • If the csfpre, csfpost, or patch files do not exist; they will be re-added to your system.
        • If the patch files are different from the one the patcher comes with, you will be prompted / asked if you wish to overwrite your already installed copy
        • If the patch files are the same as the ones which comes with the patcher; nothing will be done and it will skip that step.

    ", "tags": ["info"]}, {"location": "changelog/", "title": "Changelog", "text": "", "tags": ["changelog"]}, {"location": "changelog/#2.0.0", "title": "2.0.0 Aug 07, 2024", "text": "
    • feat: add new patch openvpn
    • feat: add new command-line arguments:
      • add -d, --dev for advanced logging
      • add -f, --flush to completely remove iptable rules
      • add -r, --report to display dependency stats, app information, etc.
      • add -v, --version to display patcher version
    • enhance: docker patch now allows for multiple ip blocks to be whitelisted
    • refactor: re-write of script
    • refactor: merge all scripts into one
    • bug: fixed issue with manual mode being disabled - #1
    • bug: fixed error \"docker network inspect\" requires at least 1 argument. - #1
    • bug: fixed error invalid port/service '-j' error
    • docs: rewrite documentation to include better instructions
    • ci: add workflow to automatically grab latest version of ConfigServer Firewall and append to each release
    ", "tags": ["changelog"]}, {"location": "changelog/#1.0.0", "title": "1.0.0 Jun 06, 2024", "text": "
    • Initial release
    ", "tags": ["changelog"]}, {"location": "home/", "title": "Home", "text": "ConfigServer Firewall

    This documentation is related to the github repository for ConfigServer Firewall; a popular and powerful firewall solution for Linux servers. On top of documentation for the software itself; this repository includes added patches which allow you to seamlessly integrate Docker and OpenVPN server with ConfigServer Firewall so that all of the services can communicate between each other without interruption.

    This documentation covers the following:

    • Install, Configure & Manage CSF (ConfigServer Firewall)
    • Install CSF WebUI interface
    • Install patches
      • Docker Integration
      • OpenVPN Integration

    ", "tags": ["home"]}, {"location": "about/conventions/", "title": "Conventions", "text": "

    This documentation use some symbols for illustration purposes. Before you read on, please make sure you've made yourself familiar with the following list of conventions:

    "}, {"location": "about/conventions/#release-type", "title": "Release Type", "text": "The tag symbol in conjunction with a version number denotes when a specific feature or behavior was added. Make sure you're at least on this version if you want to use it.

    stable

    beta

    "}, {"location": "about/conventions/#default", "title": "Controls", "text": "These icons define what type of control a specified setting uses.

    toggle

    textbox

    dropdown

    button

    slider

    color wheel

    "}, {"location": "about/conventions/#default", "title": "Default Value", "text": "This defines what the default value for a setting is.

    Specified setting has a default value

    Specified setting has no default value and is empty

    "}, {"location": "about/conventions/#experimental", "title": "Experimental", "text": "

    Anything listed with this icon are features or functionality that are still in development and may change in future versions.

    "}, {"location": "about/conventions/#required", "title": "Required value", "text": "

    Items listed with this symbol indicate that they are required to be set.

    "}, {"location": "about/conventions/#customization", "title": "Customization", "text": "

    This symbol denotes that the item described is a customization which affects the overall look of the plugin.

    "}, {"location": "about/conventions/#utility", "title": "Utility", "text": "

    This symbol denotes that the item described is classified as something that changes the overall functionality of the plugin.

    "}, {"location": "about/license/", "title": "License", "text": "

    MIT License

    Copyright \u00a9 2024 Aetherinox

    Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the \"Software\"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

    The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

    THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

    "}, {"location": "blog/", "title": "Blog", "text": ""}, {"location": "about/tags/", "title": "Tags", "text": "

    Following is a list of relevant tags:

    "}, {"location": "about/tags/#changelog", "title": "changelog", "text": "
    • Changelog
    "}, {"location": "about/tags/#home", "title": "home", "text": "
    • Home
    "}, {"location": "about/tags/#info", "title": "info", "text": "
    • About CSF
    • How this patcher works
    "}]} \ No newline at end of file diff --git a/stylesheets/extra.css b/stylesheets/extra.css index 9a21c3577..0bf96bd9b 100644 --- a/stylesheets/extra.css +++ b/stylesheets/extra.css @@ -61,6 +61,35 @@ color: #FFFFFF; } + /* + Make text opaque. used for changelog to show date + */ + + h3 > small + { + opacity: 0.4 !important; + padding-left: 10px; + margin-bottom: 28px; + } + + /* + Badge > H3 + + These are for badges that show in h3 headers + */ + + h3 .mdx-badge__icon + { + font-size: 14px; + margin-inline-end: 5px; + } + + h3 .mdx-badge svg + { + padding-left: 2px; + padding-top: 1px; + } + .color-box { float: left; height: 24px; @@ -391,7 +420,6 @@ background-color: #090909; } - /* Badge > Left Box (Icon */ @@ -401,6 +429,35 @@ background-color: #3f4faa; } + /* + Make text opaque. used for changelog to show date + */ + + h3 > small + { + opacity: 0.4 !important; + padding-left: 10px; + margin-bottom: 28px; + } + + /* + Badge > H3 + + These are for badges that show in h3 headers + */ + + h3 .mdx-badge__icon + { + font-size: 14px; + margin-inline-end: 5px; + } + + h3 .mdx-badge svg + { + padding-left: 2px; + padding-top: 1px; + } + /* Badges > Right Box */