Plesk 11.x / Linux :: Where Is Root Mysql Password
May 18, 2014
i have installed phpMyAdmin becouse I don't like the limitation of db management of Plesk, but I can't find the root password to access in it. I read that Plesk rename "root" user in "admin", but I can't find the password. Where is it?
After the upgrade of our Plesk installation from 9.5x to 11.5.30Everything works ok (sites,sites with databases, Plesk etc)but when I go to Home>Tools & Settings> Backup Manager.I see errors on every daily backup I have on schedule:
The backup Plesk_Daily_Full_Backup_1407060112.tar has completed with warnings. (View the details) Close this message
Error:mysql "myuser_drupal" Unable to define superuser password for mysql server on localhost
Error:mysql "myuser_drupal" Unable to get list of db servers (ErrorCode: 1, STDOUT.
Error:mysql "myuser_wp_eng" Unable to define superuser password for mysql server on localhost
today i changed the password for the admin panel for a customer (username eg. mylogin). 10 minutes later he called me and said that he cannot get into his emailaccount anymore. Checked the password and saw that the emailpassword for his emailaddress (eg. mylogin@mydomain.com) is now the same from the admin panel login. So i changed the emailpassword and checked the admin panel login - it now has the emailpassword. What a mess.. I'm running Plesk Panel 11.5.30 MU47.
I'm still trying to figure this one out. I got an email last night about 10:30pm that a weird IP had logged with root. I thought it was a guy that helps with tech things but I ran the IP... it came back from Korea and I knew I was in trouble. I immediately logged into WHM and changed the root password then sent the server down for a reboot. He was only in there for about 3 minutes before I nailed him. I've banned the IP from the server and have been watching it for nearly 12 hours now and they haven't came back yet.
Now comes the task of trying to figure out how he got the password. This is mind boggling to me. He knew the password, like someone gave it to him... there were no incorrect guesses or brute force. The password was a series of random letters, both upper and lower case. Is it possible he got it through getting to /etc/passwd via a PHP script? I have open basedir restrictions in place, can they get around that? I noticed at the time he logged in there were several IPs trying to exploit PHP scripts on my server, you know, setting the parameters to txt files but I assumed with shell functions disabled (except exec) and with open basedir this wouldn't be possible. Is there a hole in cpanel / PHP / kernel recently I may have missed?
Code: #%PAM-1.0 auth sufficient /lib/security/$ISA/pam_rootok.so # Uncomment the following line to implicitly trust users in the "wheel" group. #auth sufficient /lib/security/$ISA/pam_wheel.so trust use_uid # Uncomment the following line to require a user to be in the "wheel" group. #auth required /lib/security/$ISA/pam_wheel.so use_uid auth required /lib/security/$ISA/pam_stack.so service=system-auth account required /lib/security/$ISA/pam_stack.so service=system-auth password required /lib/security/$ISA/pam_stack.so service=system-auth # pam_selinux.so close must be first session rule session required /lib/security/$ISA/pam_selinux.so close session required /lib/security/$ISA/pam_stack.so service=system-auth # pam_selinux.so open and pam_xauth must be last two session rules session required /lib/security/$ISA/pam_selinux.so open session optional /lib/security/$ISA/pam_xauth.so id
Is it possible to change to root password to a VPS from inside HyperVM? I currently have 4 VPS's setup and I need to change the password for one of the VPses. Can I do this from inside HyperVM without having to go to SSH?
I have VPS's with two companies that have managed/semi-managed support (depending on how you define it) and rely on them for a fair amount.
Whenever submitting a support request, I have to submit my root and cPanel passwords. Do people in my situation leave their root password as they would normally and just changing it however often they would if it wasn't given to support? Or, do you change your root/cpanel passwords before making a support request, and then change it back after the ticket is closed?
No offense intended to either of the VPS companies or their personell (that monitor WHT), both have been great. But, the reality is that I take it everyone at the company that has access to submitted tickets now have access to the root password, and since as a customer, I don't know when there has been employee turnover, that seems a security risk.
So, I am curious how others handle this. Not really sure if this belongs here or in the VPS forum, but since it could apply to any type of server/hosting account, I figured it belonged here.
How would I go about enabling the root user on a FreeBSD 6.1 system? I've got a dedicated colocated server (hardware, not virtual) and I can't for the life of me do anything with root. I can't "su", I can't "sudo", and I can't "passwd root". I've tried different shells, etc, but nothing works. I am the server admin, but I'm doing it remotely and I just can't figure this out. I know it's not, but I'm going to ask it for the sake of it being out there anyway: Is it possible that the server lacks a root user and that I'm unable to create one?
I have recently leased Kayako support suite and I have not been able to get email piping to work. They have asked several times for the root password of my dedicated server and I have denied it. They now tell me they cannot help me if I do not provide them with the password. I find this very ridiculous since I know it is not safe to give that password. Is it advisable to give them the password and then change it after they get kayako working? What risks would I be going through?
from some time, the plesk password is no more stored in chrome.I mean that even I delete all passwords/history etc chrome don't ask to save password...so something changed in the login page I suppose.from same time every time I connect to any plesk panel. Chrome say that it's not safe and I have to click "advanced" to continue, even it's a new installation make some minute before.
I have just discovered a massive security in the CPANEL 10.9 software. This problem is in the BACKUP FEATURE. If you do remote ftp back onto the same account. It will put the file in the account home directory and it will have this type of stuff accountname:ROOTPASSWORD@serverhostname.com
We've had a customer do something strange to their server. They were playing with /etc/passwd or /etc/shadow or similar (not quite sure of the details) but the upshot is booting the server into single user and trying to reset the password via passwd gives
passwd root (and any user) passwd: Authentication token manipulation error
So far I've
Replaced /etc/passwd* and /etc/shadow* with a copy from another server Turned off SeLinux /etc/pam.d/passwd is fine Root file system is r/w
Are some days that in the root of my server there is a folder without a name. I think it is fail2ban to create this folder? Only I have access to the server.
I get an error when i try to access my webmail(horde) over the i-net i get error Unable to get webmail password every time. The error appeared when i upgraded from 11.09 to 11.5. I also followed this tutorial but it didn't worked too. --> [URL] ....