Want to subscribe to topics you're interested in?
Become a Member

[Solved] Unable to access SSH after update

Discussion in 'Bug Reports' started by ivanc82, Nov 8, 2016.

  1. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    Hi,


    I have issues after update centminmod beta, all my 3 servers unable to access SSH and my sites are all down..
     
  2. pamamolf

    pamamolf Premium Member Premium Member

    4,068
    427
    83
    May 31, 2014
    Ratings:
    +832
    Local Time:
    6:14 AM
    Nginx-1.25.x
    MariaDB 10.3.x
    Try with another ip/vpn and when you are in clear the ban that you may have on csf file...
     
  3. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    I also can't see any web traffic at all.. i think is site down..
     
  4. pamamolf

    pamamolf Premium Member Premium Member

    4,068
    427
    83
    May 31, 2014
    Ratings:
    +832
    Local Time:
    6:14 AM
    Nginx-1.25.x
    MariaDB 10.3.x
    If you solve the ssh login issue then you will be able to troubleshoot....
     
  5. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    can you help? is something get blocked? :(

    Code:
    sudo iptables -L -nv
    Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination
       67 20250 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            state RELATED,ESTABLISHED
        0     0 ACCEPT     icmp --  *      *       0.0.0.0/0            0.0.0.0/0
        0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0
        0     0 ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            state NEW tcp dpt:22
       27  3929 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibite
    d
    
    Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
     pkts bytes target     prot opt in     out     source               destination
        0     0 REJECT     all  --  *      *       0.0.0.0/0            0.0.0.0/0            reject-with icmp-host-prohibite
    d
    
    Chain OUTPUT (policy ACCEPT 101 packets, 11265 bytes)
     pkts bytes target     prot opt in     out     source               destination
    
     
  6. eva2000

    eva2000 Administrator Staff Member

    53,223
    12,116
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,654
    Local Time:
    1:14 PM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
  7. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    No i didn't disable CSF. I run it as default and after update centminmod via github the issue started..
     
  8. eva2000

    eva2000 Administrator Staff Member

    53,223
    12,116
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,654
    Local Time:
    1:14 PM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    what did you update from ? 123.08stable to 123.09beta01 or 123.09beta01 already and just update to latest code via centmin.sh menu option 23 ?

    did you update as full root user or run via sudo command (which centmin mod doesn't really support as you need to sudo switch to full root user instead of sudo cmd style)
     
  9. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    it's 123.09beta01 and update using option 23 > 2
     
  10. eva2000

    eva2000 Administrator Staff Member

    53,223
    12,116
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,654
    Local Time:
    1:14 PM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    the iptables -L -nv output suggests CSF Firewall isn't running or configured properly as you have no whitelisted ports common to CSF firewall setups when you look at iptables -L -nv output

    CSF command equivalent for iptables is
    Code (Text):
    csf -l
    

    example out of box default 123.09beta01 installed output
    Code (Text):
    csf -l
    Chain INPUT (policy DROP 0 packets, 0 bytes)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 ACCEPT     tcp  --  !lo    *       8.8.4.4              0.0.0.0/0           tcp dpt:53 
    2        0     0 ACCEPT     udp  --  !lo    *       8.8.4.4              0.0.0.0/0           udp dpt:53 
    3        0     0 ACCEPT     tcp  --  !lo    *       8.8.4.4              0.0.0.0/0           tcp spt:53 
    4        0     0 ACCEPT     udp  --  !lo    *       8.8.4.4              0.0.0.0/0           udp spt:53 
    5        0     0 ACCEPT     tcp  --  !lo    *       8.8.8.8              0.0.0.0/0           tcp dpt:53 
    6        0     0 ACCEPT     udp  --  !lo    *       8.8.8.8              0.0.0.0/0           udp dpt:53 
    7        0     0 ACCEPT     tcp  --  !lo    *       8.8.8.8              0.0.0.0/0           tcp spt:53 
    8       16  2138 ACCEPT     udp  --  !lo    *       8.8.8.8              0.0.0.0/0           udp spt:53 
    9      247  131K LOCALINPUT  all  --  !lo    *       0.0.0.0/0            0.0.0.0/0          
    10       0     0 ACCEPT     all  --  lo     *       0.0.0.0/0            0.0.0.0/0          
    11     135  125K INVALID    tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0          
    12       0     0            tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           tcp dpt:21 state NEW recent: SET name: 21 side: source 
    13       0     0 PORTFLOOD  tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           tcp dpt:21 state NEW recent: UPDATE seconds: 300 hit_count: 5 name: 21 side: source 
    14     136  126K ACCEPT     all  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
    15       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:20 
    16       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:21 
    17       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:22 
    18       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:25 
    19       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:53 
    20       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:80 
    21       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:110 
    22       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:143 
    23       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:161 
    24       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:443 
    25       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:465 
    26       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:587 
    27       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:993 
    28       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:995 
    29       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:1110 
    30       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:1186 
    31       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:1194 
    32       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:81 
    33       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:9418 
    34       0     0 ACCEPT     tcp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW tcp dpts:30001:50011 
    35       0     0 ACCEPT     udp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:67 
    36       0     0 ACCEPT     udp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:68 
    37       0     0 ACCEPT     udp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:1110 
    38       0     0 ACCEPT     udp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW udp dpts:33434:33534 
    39       0     0 ACCEPT     udp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:20 
    40       0     0 ACCEPT     udp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:21 
    41       0     0 ACCEPT     udp  --  !lo    *       0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:53 
    42       0     0 ACCEPT     icmp --  !lo    *       0.0.0.0/0            0.0.0.0/0           icmp type 8 limit: avg 1/sec burst 5 
    43       0     0 ACCEPT     icmp --  !lo    *       0.0.0.0/0            0.0.0.0/0           icmp type 0 limit: avg 1/sec burst 5 
    44       0     0 ACCEPT     icmp --  !lo    *       0.0.0.0/0            0.0.0.0/0           icmp type 11 
    45       0     0 ACCEPT     icmp --  !lo    *       0.0.0.0/0            0.0.0.0/0           icmp type 3 
    46       0     0 LOGDROPIN  all  --  !lo    *       0.0.0.0/0            0.0.0.0/0          
    
    Chain FORWARD (policy DROP 0 packets, 0 bytes)
    num   pkts bytes target     prot opt in     out     source               destination        
    
    Chain OUTPUT (policy DROP 0 packets, 0 bytes)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            8.8.4.4             tcp dpt:53 
    2        0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            8.8.4.4             udp dpt:53 
    3        0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            8.8.4.4             tcp spt:53 
    4        0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            8.8.4.4             udp spt:53 
    5        0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            8.8.8.8             tcp dpt:53 
    6       16  1088 ACCEPT     udp  --  *      !lo     0.0.0.0/0            8.8.8.8             udp dpt:53 
    7        0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            8.8.8.8             tcp spt:53 
    8        0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            8.8.8.8             udp spt:53 
    9      318 31047 LOCALOUTPUT  all  --  *      !lo     0.0.0.0/0            0.0.0.0/0          
    10       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           tcp dpt:53 
    11       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           udp dpt:53 
    12       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           tcp spt:53 
    13       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           udp spt:53 
    14       0     0 ACCEPT     all  --  *      lo      0.0.0.0/0            0.0.0.0/0          
    15     168 13687 INVALID    tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0          
    16     144 11487 ACCEPT     all  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
    17       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:993 
    18       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:995 
    19       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:465 
    20       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:587 
    21       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:1110 
    22       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:1194 
    23       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:9418 
    24       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:20 
    25       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:21 
    26       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:22 
    27       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:25 
    28       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:53 
    29       2   120 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:80 
    30       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:110 
    31       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:113 
    32       4   240 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:443 
    33       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:587 
    34       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:993 
    35       0     0 ACCEPT     tcp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW tcp dpt:995 
    36       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:67 
    37       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:68 
    38       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:1110 
    39       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpts:33434:33534 
    40       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:20 
    41       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:21 
    42       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:53 
    43       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:113 
    44       0     0 ACCEPT     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           state NEW udp dpt:123 
    45       0     0 ACCEPT     icmp --  *      !lo     0.0.0.0/0            0.0.0.0/0           icmp type 0 
    46       0     0 ACCEPT     icmp --  *      !lo     0.0.0.0/0            0.0.0.0/0           icmp type 8 
    47       0     0 ACCEPT     icmp --  *      !lo     0.0.0.0/0            0.0.0.0/0           icmp type 11 
    48       0     0 ACCEPT     icmp --  *      !lo     0.0.0.0/0            0.0.0.0/0           icmp type 3 
    49       0     0 LOGDROPOUT  all  --  *      !lo     0.0.0.0/0            0.0.0.0/0          
    
    Chain ALLOWDYNIN (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           match-set chain_ALLOWDYN src 
    
    Chain ALLOWDYNOUT (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           match-set chain_ALLOWDYN dst 
    
    Chain ALLOWIN (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1      127  6101 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           match-set chain_ALLOW src 
    
    Chain ALLOWOUT (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1      197 21736 ACCEPT     all  --  *      *       0.0.0.0/0            0.0.0.0/0           match-set chain_ALLOW dst 
    
    Chain DENYIN (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0           match-set chain_DENY src 
    
    Chain DENYOUT (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 LOGDROPOUT  all  --  *      *       0.0.0.0/0            0.0.0.0/0           match-set chain_DENY dst 
    
    Chain INVALID (2 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 INVDROP    all  --  *      *       0.0.0.0/0            0.0.0.0/0           state INVALID 
    2        0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x3F/0x00 
    3        0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x3F/0x3F 
    4        0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x03/0x03 
    5        0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x06/0x06 
    6        0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x05/0x05 
    7        0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x11/0x01 
    8        0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x18/0x08 
    9        0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x30/0x20 
    10       0     0 INVDROP    tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:!0x17/0x02 state NEW 
    
    Chain INVDROP (10 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    
    Chain LOCALINPUT (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1      247  131K ALLOWDYNIN  all  --  !lo    *       0.0.0.0/0            0.0.0.0/0          
    2      247  131K ALLOWIN    all  --  !lo    *       0.0.0.0/0            0.0.0.0/0          
    3      120  125K DENYIN     all  --  !lo    *       0.0.0.0/0            0.0.0.0/0          
    
    Chain LOCALOUTPUT (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1      318 31047 ALLOWDYNOUT  all  --  *      !lo     0.0.0.0/0            0.0.0.0/0          
    2      318 31047 ALLOWOUT   all  --  *      !lo     0.0.0.0/0            0.0.0.0/0          
    3      121  9311 DENYOUT    all  --  *      !lo     0.0.0.0/0            0.0.0.0/0          
    4       20  1520 UDPFLOOD   udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0          
    
    Chain LOGDROPIN (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:23 
    2        0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:23 
    3        0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:67 
    4        0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:67 
    5        0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:68 
    6        0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:68 
    7        0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:113 
    8        0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:113 
    9        0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpts:135:139 
    10       0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpts:135:139 
    11       0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:445 
    12       0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:445 
    13       0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:500 
    14       0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:500 
    15       0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:513 
    16       0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:513 
    17       0     0 DROP       tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp dpt:520 
    18       0     0 DROP       udp  --  *      *       0.0.0.0/0            0.0.0.0/0           udp dpt:520 
    19       0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: *TCP_IN Blocked* ' 
    20       0     0 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: *UDP_IN Blocked* ' 
    21       0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: *ICMP_IN Blocked* ' 
    22       0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    
    Chain LOGDROPOUT (2 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 LOG        tcp  --  *      *       0.0.0.0/0            0.0.0.0/0           tcp flags:0x17/0x02 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: *TCP_OUT Blocked* ' 
    2        0     0 LOG        udp  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: *UDP_OUT Blocked* ' 
    3        0     0 LOG        icmp --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: *ICMP_OUT Blocked* ' 
    4        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    
    Chain PORTFLOOD (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1        0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: *Port Flood* ' 
    2        0     0 DROP       all  --  *      *       0.0.0.0/0            0.0.0.0/0          
    
    Chain UDPFLOOD (1 references)
    num   pkts bytes target     prot opt in     out     source               destination        
    1       20  1520 RETURN     udp  --  *      *       0.0.0.0/0            0.0.0.0/0           owner UID match 0 
    2        0     0 RETURN     udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0           limit: avg 100/sec burst 500 
    3        0     0 LOG        all  --  *      *       0.0.0.0/0            0.0.0.0/0           limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: *UDPFLOOD* ' 
    4        0     0 DROP       udp  --  *      !lo     0.0.0.0/0            0.0.0.0/0          
    
    Chain PREROUTING (policy ACCEPT 1 packets, 229 bytes)
    num   pkts bytes target     prot opt in     out     source               destination        
    
    Chain POSTROUTING (policy ACCEPT 14 packets, 904 bytes)
    num   pkts bytes target     prot opt in     out     source               destination        
    
    Chain OUTPUT (policy ACCEPT 14 packets, 904 bytes)
    num   pkts bytes target     prot opt in     out     source               destination 
    
     
  11. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    hmm.. it prompted and i didn't edit anything here

    Code:
    *Error* Invalid configuration line [IPV6 = 0] in /etc/csf/csf.conf at /usr/local/csf/lib/ConfigServer/LookUpIP.pm line 2
    6.
    Compilation failed in require at /sbin/csf line 20.
    BEGIN failed--compilation aborted at /sbin/csf line 20.
    
     
  12. eva2000

    eva2000 Administrator Staff Member

    53,223
    12,116
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,654
    Local Time:
    1:14 PM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    ah it's a recent change i made !
     
  13. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    :D
     
  14. eva2000

    eva2000 Administrator Staff Member

    53,223
    12,116
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,654
    Local Time:
    1:14 PM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
    What do you get when you manually fix it via these 3 commands
    Code (Text):
    sed -i "s|^IPV6 = .*|IPV6 = \"0\"|" /etc/csf/csf.conf
    csf -r
    csf -u
    
     
  15. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    ohh.. now seems okay! i can access. i'm using remote access... and after unblock my ip i'm in SSH!
     
  16. eva2000

    eva2000 Administrator Staff Member

    53,223
    12,116
    113
    May 24, 2014
    Brisbane, Australia
    Ratings:
    +18,654
    Local Time:
    1:14 PM
    Nginx 1.27.x
    MariaDB 10.x/11.4+
  17. ivanc82

    ivanc82 New Member

    27
    2
    3
    Dec 1, 2015
    Ratings:
    +4
    Local Time:
    11:14 AM
    1.11.4
    MariaDB 10
    thanks for the help and you're welcome (y)