• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Plesk12 with high security risk!?

Azurel

Silver Pleskian
"security" is maybe not the exact term. Here is a big problem with plesk and nginx!

I have report this for plesk 11.5 and plesk 12 have this problem too. Nginx not send correct visitor ip. I have heavy traffic and cpu load from a attacker and can't point out which ip caused this problem, because I see only my own ipv6 as culprit. Plesk help here attackers to hide attacks. Not the best choice.

# netstat -plan|grep :80|awk {'print $5'}| rev | cut -d: --complement -f1 | rev |sort|uniq -c|sort -nk 1
24 87.143.80.*
29 72.46.133.*
32 146.52.212.*
40 72.46.134.*
679 2a01:SERVER-IP

# awk -vDate=`date -d'now-2 hours' +[%d/%b/%Y:%H:%M:%S` ' { if ($4 > Date) print $1}' access_log | sort |uniq -c |sort -n | tail
.....
4835 157.55.*.*
4891 178.154.*.*
4964 37.140.*.*
5187 207.46.*.*
55305 2a01:SERVER-IP

# awk -vDate=`date -d'now-2 hours' +[%d/%b/%Y:%H:%M:%S` ' { if ($4 > Date) print $1}' proxy_access_log | sort |uniq -c |sort -n | tail
.....
2543 91.64.*.*
2666 87.123.*.*
2676 217.190.*.*
3059 82.83.*.*
55251 2a01:SERVER-IP

What I can now do, to identify the attackers ip for banning? Any help is appreciated. My server going slower and slower....
 
Thanks, but that no good solution for customers. Thats not help so much, because plesk said:

#ATTENTION!
#
#DO NOT MODIFY THIS FILE BECAUSE IT WAS GENERATED AUTOMATICALLY,
#SO ALL YOUR CHANGES WILL BE LOST THE NEXT TIME THE FILE IS GENERATED.

Is here no tutorial from parallels to fix this annoying problem?

My server hoster have fix this in plesk 11.5 for me, but for version 12 he said that fix is not possible anymore.
 
@Azurel,

I strongly suggest to install the Fail2Ban module and set a proper jail and corresponding filter, by preference a custom jail with custom filters.

The main advantage of this approach that (mostly) attackers will give up, in case of a (temporary) IP ban by Fail2Ban.

Furthermore, this approach will give you easy insight in "bad" IPs, being used for "attacks" and hence allowing you to set-up the firewall (i.e. creating a permanent IP block).

Kind regards....
 
@Azurel,

It is not necessary to have a thorough knowledge of Fail2Ban: activate all jails, the settings "out-of-the-box" are very reasonable.

The only thing that should be optionally adjusted is

- the trusted IP addresses: add your own standard IP,
- the ssh jail, the number of attempts should be minimized to 2.

Furthermore, to make ssh safe, modify the firewall rules and add "allow, deny all others rule" for the standard IP you are using (in order to allow access for you only).

Kind regards....
 
Back
Top