• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Password Security Update/Changes

Tsi-Shawn

Basic Pleskian
OS CentOS 6.5 (Final)
Panel version 11.0.9 Update #62, last updated at July 22, 2014 04:25 AM
The system is up-to-date; last checked at Sept 6, 2014 04:12 AM


Last week I made a change to the security policy going from Medium to Strong. This week I began my final push of a migration from this server to a new VM with Cent 6.5 and Plesk 12. The migration failed and in looking for the reason it was suggested by Igor that I try the commands below. I did so and I found several domains that had empty passwords.

While making changes to those email addresses I received a call from our Biz dept and was advised that all the domain customers on the server were calling in because their email was failing. The fix was to change(update) their passwords. Can anyone confirm (or deny) that the commands below would force the domains to start using the stronger password policy?

I find it quite suspicious that I ran these and not 5 minutes later we were taking calls for bad passwords.



Check whether there are any mail accounts without a password set up. Log in to the PSA database and execute:

mysql> SELECT CONCAT_WS('@',mail.mail_name,domains.name),accounts.password FROM domains,mail,accounts WHERE domains.id=mail.dom_id AND accounts.id=mail.account_id AND accounts.password='' ORDER BY domains.name ASC,mail.mail_name ASC;

Check whether there are accounts for which passwords cannot be decrypted by Parallels Plesk Panel (Plesk):

/usr/local/psa/admin/sbin/mail_auth_view | grep '$AES'


Check for mailboxes with an incorrect encryption method defined in the Plesk database:

mysql -uadmin -p`cat /etc/psa/.psa.shadow ` psa -Ne "SELECT CONCAT_WS('@',mail.mail_name,domains.name),accounts.password FROM domains,mail,accounts WHERE domains.id=mail.dom_id AND accounts.id=mail.account_id AND accounts.type='sym' and accounts.password not like '%AES%' ORDER BY domains.name ASC,mail.mail_name ASC"
 
Any thoughts from anyone? While it is not a service interrupting problem it did generate a ton of calls and I need to know why this happened.
 
Back
Top