Posts by ojahosting

    for me adding

    global $configLevel

    at line 414 in

    /var/www/imscp/gui/plugins/PhpSwitcher/frontend/client/phpswitcher.php

    helps

    (or maybe move the $configLevel part in front of file)

    ##


    @@ -411,6 +411,7 @@

    iMSCP_Events::onClientScriptStart

    );

    customerHasFeature('php') or showNotFoundErrorPage();

    +global $configLevel;

    $configLevel = (new iMSCP_Config_Handler_File(

    iMSCP_Registry::get('config')['CONF_DIR'] . '/php/php.data'

    ))['PHP_CONFIG_LEVEL'];

    I use https://www.abuseipdb.com/ with ipset/iptables with confidenceMinimum=49 and i block all tor exit nodes and the spamhaus drop list

    A lot less problems with spammer/hacked websites/...



    Against the wp-login.php brute force i use sometimes mod_qos (not at all sites - webdesigner could run into this qos too)


    SetEnvIf Request_URI ^/xmlrpc.php LimitWpXmlRpc

    QS_ClientEventLimitCount 10 120 LimitWpXmlRpc

    SetEnvIf Request_URI ^/wp-login.php LimitWpLogin

    QS_ClientEventLimitCount 10 120 LimitWpLogin


    If i have a customer whos a real target of a botnet than only a hetzner/ovh VM behind cloudflare is a solution and the hope thats the botnet is fast switching to the new target...

    I fixed it for me in the template
    not really looked deeper into this problem but this works for me.


    /var/www/imscp/gui/plugins/PhpSwitcher/themes/default/view/client# diff page.org.phtml page.phtml

    15c15

    < columnDefs: [{sortable: false, searchable: false, targets: [1]}]

    ---

    > columnDefs: [{sortable: false, searchable: false, targets: [1, 2]}]


    and restart the panel


    /etc/init.d/imscp_panel restart