Author Topic: CSF Blocks Login url/port ?  (Read 1850 times)

0 Members and 1 Guest are viewing this topic.

CSF Blocks Login url/port ?
« on: August 10, 2015, 05:30:23 PM »
Well I have make several changes,

01) Changed both Login ports 2030 and 2031.
02) Add records of new ports into iptables.
03) Changed SHH port
04) added changed to /etc/csf/csf.conf (I removed port 22 and added new SSH port and also remove and added new login ports).

now my 2 problems.

01) Now when I enable CSF it blocks login ports it seems

02) Still I can use SSH using port 22 but new SSH doesn't work.


Re: CSF Blocks Login url/port ?
« Reply #1 on: July 08, 2016, 03:25:44 PM »

I had the same trouble and now it's work well again. After a few minutes and few head hash, this is what command solves it.

To Change SSH port on a CentOS Linux
You can use any one of the following option in/etc/ssh/sshd_config file:

Code: [Select]
Port PortNumberHereOR
Code: [Select]
ListenAddress IPv4Address:Port
ListenAddress IPv6Address:Port
ListenAddress Hostname:Port

If Port is not specified, sshd will listen on the address and all prior Port options specified. The
default is to listen on all local IP addresses. Multiple ListenAddress options are aloowed in

Run ssh on a non-standard port # 2022 using Portoption
Edit /etc/ssh/sshd_config, enter:
Code: [Select]
# vi /etc/ssh/sshd_config
Edit/Append as follows to set Port to 2022:
Code: [Select]
Port 2022Save and close the file.

CentOS run ssh on a non-standard port # 2022 using ListenAddress option
Note: If you have multiple IP address on the server, try ListenAddress as follows :

Code: [Select]
## bind sshd to two ip address on a non‐standard port ##
Save and close the file.
Reload SSHD service

Before you restart or reload sshd server. You need to update:
  • 1. SELinux configuration
    2. Firewall settings
    3. fail2ban settings

A note about OpenSSH SELinux user
If you are using SELinux, add tcp port # 2022 to port contexts for OpenSSH server:
Code: [Select]
# semanage port ‐a ‐t ssh_port_t ‐p tcp 2022
Update firewall settings
You also need to update firewall settings so that users can login using TCP # 2022.
Edit, /etc/sysconfig/iptables and open sshd port 2022:
Code: [Select]
# vi /etc/sysconfig/iptables
Edit/append as follows:
Code: [Select]
## delete or comment out port 22 line ##
## ‐A INPUT ‐m state ‐‐state NEW ‐m tcp ‐p tcp ‐‐dport 22 ‐j ACCEPT
## open port 2022
‐A INPUT ‐m state ‐‐state NEW ‐m tcp ‐p tcp ‐‐dport 2022 ‐j ACCEPT

Save and close the file. If you are using IPv6, edit/etc/sysconfig/ip6tables file too.

Temporally, stop the firewall so that you will not loos the connectivity to the server:
Code: [Select]
# service iptables stop
# service ip6tables stop

Fail2ban settings
Fail2ban scans log files and bans IPs that show the malicious signs too many password failures,
seeking for exploits, ssh login etc. See this comment below on how to change your port number and you use fail2ban you have to update the rules.

Restart sshd on a CentOS
Type the following command to restart / reload SSHD service:

Code: [Select]
# service sshd reloadVerify new port settings with the following netstat command:
Code: [Select]
# netstat ‐tulpn | grep sshd
Finally, star the firewall on a CentOS Linux:
Code: [Select]
# service iptables start
## IPv6 ##
# service ip6tables start

Now it's done, enjoy !