This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
106
CentOS-WebPanel Bugs / Re: User login infinite loop
« on: February 03, 2020, 01:44:28 PM »
Fixed release 935

107
Information / CWP user login broke, support wants $$$
« on: February 03, 2020, 12:46:29 PM »
This problem is serious. Login page will not even load.
I contacted support and they told me that I have to pay them to fix it.
Right. Good idea.
I contacted support and they told me that I have to pay them to fix it.
Right. Good idea.




108
Information / Re: User login locked screen
« on: February 03, 2020, 12:24:51 AM »Login to admin. Under Security tab -> User Login Security
Hit purge all and see if it fixes it.
I compared sourcecode for a working user login page and this bad user login page. Very bid difference between the two.
109
Information / Re: User login locked screen
« on: February 02, 2020, 11:47:35 PM »
I have check all of my log files and cannot find anything in connection with this problem.
110
Information / Re: User login locked screen
« on: February 02, 2020, 10:04:48 PM »
[ssl:warn] [pid 18654:tid 140070880978816] AH01873: Init: Session Cache is not configured [hint: SSLSessionCache]
Maybe?
Maybe?
113
Information / Re: User login locked screen
« on: February 02, 2020, 04:55:04 PM »
no change in list accounts
115
Information / Re: User login locked screen
« on: February 02, 2020, 01:27:41 PM »
failed login screen is in an infinite loop and keeps loading.
Login into admin from same ip has no problems.
Login into admin from same ip has no problems.
116
Information / User login locked screen
« on: February 02, 2020, 03:58:55 AM »
I am getting an error screen for user login indicating that screen is locked due to reaching maximum number of failed attempts.
I am not blocked by modsec or csf. 2082 and 2083
I am not blocked by modsec or csf. 2082 and 2083
117
Information / Re: CSF not working if you use country codes
« on: February 01, 2020, 12:30:52 AM »
Results of using cc_allow_filter
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_us src
csf: IPSET loading set cc_us with 18450 entries
csf: IPSET creating set cc_ir
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_ir src
csf: IPSET loading set cc_ir with 1358 entries
csf: IPSET creating set cc_ie
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_ie src
csf: IPSET loading set cc_ie with 597 entries
csf: IPSET creating set cc_de
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_de src
csf: IPSET loading set cc_de with 7422 entries
csf: IPSET creating set cc_za
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_za src
csf: IPSET loading set cc_za with 1109 entries
csf: IPSET creating set cc_cu
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_cu src
csf: IPSET loading set cc_cu with 17 entries
csf: IPSET creating set cc_mx
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_mx src
csf: IPSET loading set cc_mx with 653 entries
csf: IPSET creating set cc_gb
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_gb src
csf: IPSET loading set cc_gb with 7129 entries
csf: IPSET creating set cc_fr
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_fr src
csf: IPSET loading set cc_fr with 29125 entries
csf: IPSET creating set cc_ca
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_ca src
csf: IPSET loading set cc_ca with 4674 entries
You are right about one thing, ipset is your friend. Unfortunately, you cant seem to grasp the basic concept that the rest of the firewall users seem to understand.
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_us src
csf: IPSET loading set cc_us with 18450 entries
csf: IPSET creating set cc_ir
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_ir src
csf: IPSET loading set cc_ir with 1358 entries
csf: IPSET creating set cc_ie
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_ie src
csf: IPSET loading set cc_ie with 597 entries
csf: IPSET creating set cc_de
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_de src
csf: IPSET loading set cc_de with 7422 entries
csf: IPSET creating set cc_za
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_za src
csf: IPSET loading set cc_za with 1109 entries
csf: IPSET creating set cc_cu
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_cu src
csf: IPSET loading set cc_cu with 17 entries
csf: IPSET creating set cc_mx
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_mx src
csf: IPSET loading set cc_mx with 653 entries
csf: IPSET creating set cc_gb
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_gb src
csf: IPSET loading set cc_gb with 7129 entries
csf: IPSET creating set cc_fr
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_fr src
csf: IPSET loading set cc_fr with 29125 entries
csf: IPSET creating set cc_ca
RETURN all opt -- in * out * 0.0.0.0/0 -> 0.0.0.0/0 match-set cc_ca src
csf: IPSET loading set cc_ca with 4674 entries
You are right about one thing, ipset is your friend. Unfortunately, you cant seem to grasp the basic concept that the rest of the firewall users seem to understand.
118
Information / Re: CSF not working if you use country codes
« on: January 31, 2020, 11:42:04 AM »
listing more than a few countries in cc deny is a bad idea. It will make your server crawl.
better idea is to use cc allow filter.
You can just add US if that is all you want to see your site.
better idea is to use cc allow filter.
You can just add US if that is all you want to see your site.
119
Information / Re: CSF not working if you use country codes
« on: January 30, 2020, 04:48:00 PM »
Update. I was using ipverse and I had trouble with country codes working. I switched back to maxmind and its working. Updating cwp was not working while using cc_allow_filter. But everything is working for the moment.
120
CentOS-WebPanel Bugs / Re: crontab GUI bug User
« on: January 29, 2020, 10:59:50 PM »
ALSO WEEDAYS
