The most important information that we will probably get are from the log files. If you are new to Cpanel/WHM you would like to know where the log files are located.
In Short /var/log is the place where you can find out all Linux related log files, but for applications such as Cpanel/WHM the log file locations are different.
Log Files
- access_log — A file containing a record of IP addresses of visitors that have accessed sites hosted by your server. This file can be found at /usr/local/apache/logs/access_log.
- cpdavd_error_log — A file that contains a record of errors that were encountered by cpdavd. This file can be found at /usr/local/cpanel/logs/cpdavd_error_log.
- cphulkd_errors_log — A file that contains a record of errors encountered by the cphulkd. This file can be found at /usr/local/cpanel/logs/cphulkd_errors.log.
- error_log — A file that contains a record of errors encountered by the Apache web server. This file can be found at /usr/local/apache/logs/error_log.
- license_log — A file that contains a record of errors that were encountered when cPanel checked its license. This can be found at /usr/local/cpanel/logs/license_log.
- login_log — A file that contains a record of failed login attempts. This file can be found at/usr/local/cpanel/logs/login_log.
- stats_log — A file that contains a record of the activities of cpanellogd, the daemon that compiles your server’s web statistics. This file can be found at /usr/local/cpanel/logs/stats_log.
- tailwatchd_log — A file that contains a record of errors encountered by tailwatchd, the daemon that monitors your server’s logs. This can be found at /usr/local/cpanel/logs/tailwatchd_log.
On this following post, We’ll provide a *short* exim useful command list for handle Exim Mail Administration in a easy way.
Find exim current version:
Delete All Frozen Emails:
-
exim -bpru|grep frozen|awk {’print $3′}|xargs exim -Mr
Force delivery of an email:
Force another queue run:
Force another queue run and attempt to flush the frozen messages:
View the log for the message:
View the body of the message:
View the header of the message:
Remove bounced emails
-
cd /var/spool/exim/input
-
find . -type f -iname ‘*’ -exec grep -li "Failed" {} \; -exec rm {}\;
If you’re currently using cPanel along with ProFTPd as your default FTP service and you are getting disconnection nor timeout issues while trying to edit a file or uploading/downloading it’s probably because cPanel leaves the Timeout settings for ProFTPd with default settings.
Due this, you will need to edit your ProFTPd configuration file and add custom timeouts to make it work properly.
Add the following Timeout settings below the comments (#’s):
TimeoutLogin 120
TimeoutIdle 3600
TimeoutNoTransfer 3600
TimeoutStalled 3600
Save and quit editting proftpd.conf and restart the service.
Try again and let us know if you continue experiencing disconnection issues.
On this post we are going to show how to quickly patch a common PCI Vulnerability Alert that says something like this:
“The remote service appears to encrypt traffic using SSL protocol version 2″.
In Apache common ports 80 and 443, you need to modify the SSLCipherSuite directive in the httpd.conf or ssl.conf file.
An example would be editing the following lines to something like:
-
SSLProtocol -ALL +SSLv3 +TLSv1
-
SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:-LOW:-SSLv2:-EXP
After you have done this, if you see you are still getting PCI Compliance vulnerability emails regarding to this issue its probably that cPanel is still allowing SSLv2 on their ports.
To quickly disable SSL version 2 on cPanel ports: 2082, 2083, 2086, 2087, 2095, 2096. You will need to do the following:
edit /var/cpanel/cpanel.config and change nativessl=1 to nativessl=0
This will make cPanel to use sTunnel.
edit /usr/local/cpanel/etc/stunnel/default/stunnel.conf
and add:
just below the “Authentication stuff” tab.
After you have done all this you will need to restart cPanel:
-
/etc/init.d/cpanel restart
Done!
How to quickly check this?
SSH to your server and type the following commands
-
root@cPanel [~]# openssl s_client -ssl2 -connect localhost:2096
-
root@cPanel [~]# openssl s_client -ssl2 -connect localhost:2083
-
root@cPanel [~]# openssl s_client -ssl2 -connect localhost:2087
-
root@cPanel [~]# openssl s_client -ssl2 -connect localhost:2086
If everything is fine you should receive something like this,
-
root@cPanel [~]# openssl s_client -ssl2 -connect localhost:2096
-
CONNECTED(00000003)
-
write:errno=104
We highly recommend to all our customers to enable SpamAssassin on any cPanel account (server-wide).
SpamAssassin is a mail filter installed on a server to identify spam.
It checks for spam using many pre-set rules that check the header, body, and sender of all email messages sent to your domain mailbox.
SpamAssassin generates a score for each email. Score above the spam threshold and the mail is marked as spam.
There are a number of different actions related to reducing spam with SpamAssassin.
To enable SpamAssassin on your cPanel account do the following:
-
Log into your cPanel account
-
Click the Mail icon
-
Click the Spam Assassin link (towards the bottom)
-
Click Enable Spam Assassin button
-
Spam Assassin should be now enabled on this account!