• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.

Issue Composer Not Found PHP

Actually, the most secure option is the chrooted shell. This jails the user to his own webspace. A webspace user should not be able to access anything outside of his own webspace. If you provide full access through another shell type, hackers will use this opportunity to install malware on your server. This will occur through unsecure or malicious plugins of the website software. Enabling full shell access can also lead to a total desaster as that user can then remove files and directories.
 
Ok, so I set up chroot, as I guessed, and then use the su command to log into root.
But at this point, couldn't hackers do the same?
 
When you login to a shell from within a subscription, your user account that logs in is the subscriber. When you chroot the environment, the subscriber is jailed to the subscription. The subscriber cannot escalate privileges to root.
 
Ok and here we are, but maybe you don't understand me?
I need to disable root, so first I need to create a user from which I can use the su command........
 
I suggest adding a new user using the Linux commands:
# adduser anotheruser

Next, set a password:
# passwd anotheruser

And add the new user to the wheel group that allows the user to su to root:
# usermod -aG wheel anotheruser

That should be enough to ssh to the server with the new user and become root.
 
Back
Top