Archive for the 'Plesk Support' Category

How to enable Apache graceful restart in Plesk

APPLIES TO:

Parallels Plesk Panel 11.0 for Linux
Parallels Plesk Panel 10.4 for Linux/Unix
Parallels Plesk Panel 10.3 for Linux/Unix

By default, Parallels Plesk Panel does not use Apache graceful restart for applying new settings.

Solution:

To enable graceful restart, you should add the parameter “restart_apache_gracefully” with a “true” value to the “misc” table of the “psa” database. It can be done by the following SQL query:

mysql> INSERT INTO misc VALUES (’restart_apache_gracefully’, ‘true’);

How to enable Apache graceful restart in Plesk

APPLIES TO:

Parallels Plesk Panel 11.0 for Linux
Parallels Plesk Panel 10.4 for Linux/Unix
Parallels Plesk Panel 10.3 for Linux/Unix

Symptoms
By default, Parallels Plesk Panel does not use Apache graceful restart for applying new settings.

Resolution
To enable graceful restart, you should add the parameter “restart_apache_gracefully” with a “true” value to the “misc” table of the “psa” database. It can be done by the following SQL query:

mysql> INSERT INTO misc VALUES (’restart_apache_gracefully’, ‘true’);

Important Parallels Plesk Panel Critical Vulnerability MicroUpdates

Parallels has released new set of Critical MicroUpdates for certain versions of Plesk Panel 10.4 or earlier to address functional fixes, stability, and security – including third-party components.

Impact
These MicroUpdates are not needed for Parallels Plesk Panel 11. Updating prior versions to Parallels Plesk Panel 11 eliminates the need to apply this set of Critical MicroUpdates. Parallels Plesk Panel 11 can be downloaded from: http://www.parallels.com/download/plesk.

These Critical MicroUpdates are available for Windows and Linux for the following versions of Parallels Plesk Panel:

10.4.x
10.3.x
10.2.x
10.1.x
10.0.x
9.5.x
9.3.x
9.2.x
9.0.x
8.6.x
8.4.x
8.2.x

Independent of this update Parallels has become aware of unsubstantiated claims of a new Security Vulnerability in Parallels Plesk Panel version 10.4 and earlier (http://kb.parallels.com/en/114330). After extensive investigation, Parallels has traced all reported issues back to the vulnerability already reported and closed with the February 2012 security advisory http://kb.parallels.com/113321. This vulnerability has had patches and remediation steps available since February 2012.

Call to Action and Best Practices

By applying this new MicroUpdate, all previous MicroUpdates will also be applied (including those discussed in the most recent advisory: http://kb.parallels.com/113321).

Independent of this update Parallels has become aware of unsubstantiated claims of a new Security Vulnerability in Parallels Plesk Panel version 10.4 and earlier (http://kb.parallels.com/en/114330). After extensive investigation, Parallels has traced all reported issues back to the vulnerability already reported and closed with the February 2012 security advisory http://kb.parallels.com/113321. This vulnerability has had patches and remediation steps available since February 2012.

Parallels takes the security of our customers very seriously and encourages you to take the recommended actions as soon as possible.

Important Note: Your updated Parallels Plesk Panel installation will only be secureif your underlying server infrastructure is correctly maintained and patched. Please ensure that all your server components including operating systems and databases are correctly patched and up-to-date.

Remove any active sessions using:

# php -d open_basedir= -d safe_mode=0 plesk_password_changer.php `cat /etc/psa/.psa.shadow` –clean-up-sessions

Review published web content for integrity, removing any malicious scripts:

# grep -ilr ‘km0ae9gr6m’ /var/www/vhosts/ | while read arq; do echo $arq; echo $arq >> /root/infected.txt; sed -ni ‘1h;1!H;${x;s/km0ae9gr6m.*qhk6sa6g1c/virus removed/;p}’ $arq; done;

Should you require further support to patch/upgrade your Parallels Plesk Panel or solve this issue, please submit a Full Security Audit plan: http://www.serverbuddies.com/full-server-security-audit.php

How to hide the user interface elements related to mail services from the Control Panel:

1. In the Server Administration Panel, go to Settings > Mail Server Settings (in the Mail group
2. Clear the Enable mail management functions in Panel checkbox.
3. Click OK.

Alternately, you can hide these elements by using the server_pref command line utility:

On Linux systems

/usr/local/psa/bin/server_pref -u -disable-mail-ui true

If you need to restore the mail management controls, you can do so either by going to Server Administration Panel > Settings > Mail Server Settings, and selecting the Enable mail management functions in Panel checkbox, or by using the command line utility:

On Linux systems

/usr/local/psa/bin/server_pref -u -disable-mail-ui false

Reference: http://parallels.net/

How to customize or remove Panel License and Add-On Keys

In Server Administration Panel > Tools & Utilities > License Management, there are links that can be customize or remove:

If you need to customize these links so as to point at your company’s website, create a text file named panel.ini and place the following lines there:

[marketplace]
panelAndAddonsLicensesStore = “”

If you want to remove these links from the Panel, leave the URL empty:

[marketplace]
panelAndAddonsLicensesStore = “”

Save the file and place it in the following directory on the Panel-managed server:

On Unix/Linux: /usr/local/psa/admin/conf/

To undo the customization and return to default values, remove these strings from panel.ini.

Reference: http://parallels.net

« Prev - Next »