• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Question WPToolkit Block access to potentially sensitive files

Dmytro

Basic Pleskian
Server operating system version
CloudLinux 8.8
Plesk version and microupdate number
18.0.61 #5
Hi. WPToolkit has this option here:

UjXIBol.png


Once it is enabled, nginx vhost configuration file be appended with this rule:

Code:
# "Block access to potentially sensitive files"
    # To remove this rule, revert this security measure on each WordPress installation on this domain
    location ~* ".*\.(?:psd|log|cmd|exe|bat|csh|ini|sh)$" {
        return 403;
    }

In this case it blocks even local requests to .user.ini files that is could be used for different purposes , for example this file used by WordFence firewall
 
It blocks direct access to these files for remote requests. But it does not prohibits the usage of these files. The WordFence firewall should still function if this rule is enabled.
 
I thought it's wordfence because of this log entry (get request from server ip where site is hosted)

o0huWvH.png
 
.user.ini should not be a requirement by Wordfence. If specific webspace configurations are required, these can also be set in the panel's GUI.
 
@Dmytro the errors shown on the log of your screenshot are not caused by the "Block access to potentially sensitive files" option from the WP toolkit. (Because in that case the errors would get logged in the Nginx logs.) Instead these errors are (most likely) caused by the .htaccess configuration from WordFence, which blocks access the .user.ini file too. When the WordFence firewall scan runs, it checks if this file is file isn't accessible. That's why it shows up in your logs with the IP from the server.
 
@Dmytro the errors shown on the log of your screenshot are not caused by the "Block access to potentially sensitive files" option from the WP toolkit. (Because in that case the errors would get logged in the Nginx logs.) Instead these errors are (most likely) caused by the .htaccess configuration from WordFence, which blocks access the .user.ini file too. When the WordFence firewall scan runs, it checks if this file is file isn't accessible. That's why it shows up in your logs with the IP from the server.
thanks, looks like it's best answer!
 
Back
Top