Archive for the tag 'Panel'

Parallels Plesk Panel Server backup repository

Server backup repository location.

As of Parallels Plesk Panel version 9.0, the structure and location of the server backup repository have both changed.
The root backup directory is now stored in the file /etc/psa/psa.conf, while it is still set by the variable DUMP_D as before:

Backups directory

DUMP_D /var/lib/psa/dumps

Server backups, backups of resellers, clients, domains, and daily MySQL dumps are now stored in this directory.

How to verify Apache web server status - Parallels Plesk Panel for Linux/Unix.

The name of Apache 2 binary on Debian and SuSE OSes is “apache2,” not “httpd” as it is on Red Hat-based Linux distributions or FreeBSD.

# ps ax | grep httpd | grep -v grep

If not, try to start Apache from Plesk CP or via command line. If you get an error, check /var/log/httpd/error_log (/var/log/apache2/error_log on SuSE and Debian, /usr/local/psa/apache/logs/error_log on FreeBSD)

Make sure that Apache is listening on the both HTTP and HTTPS ports (80/443) on all needed IP addresses:

# netstat -l | grep http
tcp 0 0 *:http *:* LISTEN
tcp 0 0 *:https *:* LISTEN

Important Parallels Plesk Panel Critical Vulnerability MicroUpdates

Parallels has released new set of Critical MicroUpdates for certain versions of Plesk Panel 10.4 or earlier to address functional fixes, stability, and security – including third-party components.

Impact
These MicroUpdates are not needed for Parallels Plesk Panel 11. Updating prior versions to Parallels Plesk Panel 11 eliminates the need to apply this set of Critical MicroUpdates. Parallels Plesk Panel 11 can be downloaded from: http://www.parallels.com/download/plesk.

These Critical MicroUpdates are available for Windows and Linux for the following versions of Parallels Plesk Panel:

10.4.x
10.3.x
10.2.x
10.1.x
10.0.x
9.5.x
9.3.x
9.2.x
9.0.x
8.6.x
8.4.x
8.2.x

Independent of this update Parallels has become aware of unsubstantiated claims of a new Security Vulnerability in Parallels Plesk Panel version 10.4 and earlier (http://kb.parallels.com/en/114330). After extensive investigation, Parallels has traced all reported issues back to the vulnerability already reported and closed with the February 2012 security advisory http://kb.parallels.com/113321. This vulnerability has had patches and remediation steps available since February 2012.

Call to Action and Best Practices

By applying this new MicroUpdate, all previous MicroUpdates will also be applied (including those discussed in the most recent advisory: http://kb.parallels.com/113321).

Independent of this update Parallels has become aware of unsubstantiated claims of a new Security Vulnerability in Parallels Plesk Panel version 10.4 and earlier (http://kb.parallels.com/en/114330). After extensive investigation, Parallels has traced all reported issues back to the vulnerability already reported and closed with the February 2012 security advisory http://kb.parallels.com/113321. This vulnerability has had patches and remediation steps available since February 2012.

Parallels takes the security of our customers very seriously and encourages you to take the recommended actions as soon as possible.

Important Note: Your updated Parallels Plesk Panel installation will only be secureif your underlying server infrastructure is correctly maintained and patched. Please ensure that all your server components including operating systems and databases are correctly patched and up-to-date.

Remove any active sessions using:

# php -d open_basedir= -d safe_mode=0 plesk_password_changer.php `cat /etc/psa/.psa.shadow` –clean-up-sessions

Review published web content for integrity, removing any malicious scripts:

# grep -ilr ‘km0ae9gr6m’ /var/www/vhosts/ | while read arq; do echo $arq; echo $arq >> /root/infected.txt; sed -ni ‘1h;1!H;${x;s/km0ae9gr6m.*qhk6sa6g1c/virus removed/;p}’ $arq; done;

Should you require further support to patch/upgrade your Parallels Plesk Panel or solve this issue, please submit a Full Security Audit plan: http://www.serverbuddies.com/full-server-security-audit.php

How to hide the user interface elements related to mail services from the Control Panel:

1. In the Server Administration Panel, go to Settings > Mail Server Settings (in the Mail group
2. Clear the Enable mail management functions in Panel checkbox.
3. Click OK.

Alternately, you can hide these elements by using the server_pref command line utility:

On Linux systems

/usr/local/psa/bin/server_pref -u -disable-mail-ui true

If you need to restore the mail management controls, you can do so either by going to Server Administration Panel > Settings > Mail Server Settings, and selecting the Enable mail management functions in Panel checkbox, or by using the command line utility:

On Linux systems

/usr/local/psa/bin/server_pref -u -disable-mail-ui false

Reference: http://parallels.net/

How to customize or remove Panel License and Add-On Keys

In Server Administration Panel > Tools & Utilities > License Management, there are links that can be customize or remove:

If you need to customize these links so as to point at your company’s website, create a text file named panel.ini and place the following lines there:

[marketplace]
panelAndAddonsLicensesStore = “”

If you want to remove these links from the Panel, leave the URL empty:

[marketplace]
panelAndAddonsLicensesStore = “”

Save the file and place it in the following directory on the Panel-managed server:

On Unix/Linux: /usr/local/psa/admin/conf/

To undo the customization and return to default values, remove these strings from panel.ini.

Reference: http://parallels.net

Next »