SSH method
Login to SSH as root and Run below line.
echo 500 > /etc/virtual/bdhostit.com/limit/helpdesk1
The above command will increase daily email sending limit to 500 of helpdesk1@bdhostit.com.
Change the bold text replacing your details.
by dev
SSH method
Login to SSH as root and Run below line.
echo 500 > /etc/virtual/bdhostit.com/limit/helpdesk1
The above command will increase daily email sending limit to 500 of helpdesk1@bdhostit.com.
Change the bold text replacing your details.
by dev
This would mean that the account likely already exists on the system in /etc/passwd, and the the data in /usr/local/directadmin/data/users/username does not exist.
userdel -r username
cd /usr/local/directadmin/scripts ./fix_da_user.sh username user domain.com
by dev
To move a database from one user, to another user, run the following command:
VERBOSE=1 DBUSER="da_admin" DBPASS="da_adminpass" USERNAME="username" NEWUSERNAME="newusername" /usr/local/bin/php /usr/local/directadmin/scripts/change_database_username.php
by dev
Using php in CLI mode (not suPhp) to change the open_basedir value,:
Admin Level -> Custom httpd configuration -> domain.com
Insert below line In the top text area:
|?OPEN_BASEDIR_PATH=`HOME`/:/tmp:/var/tmp/:/usr/local/lib/php/|
by dev
WordPress utilizes XML-RPC to remotely execute functions for example JetPack, WordPress mobile application etc. But XMLRPC Attack made web server jam. In HTTP access log, we saw a lot of requests like this:
61.135.232.103 - - [11/Sep/2020:10:27:20 -0500] "POST /xmlrpc.php HTTP/1.1" 200 401 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 91.132.142.57 - - [11/Sep/2020:10:39:03 -0500] "POST /xmlrpc.php HTTP/1.1" 200 401 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 5.33.187.36 - - [11/Sep/2020:10:43:28 -0500] "POST /xmlrpc.php HTTP/1.1" 200 401 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
You will also get “Error connecting to database” message when your WordPress site is down.
Solutions
We can secure server from XMLRPC attacks in several ways
<files xmlrpc.php> Order allow,deny Deny from all </files>
If don’t have httpd.conf or .htaccess, we can simply rename the filename.
/etc/httpd/conf/httpd.conf