Hello,
DirectAdmin pleased to announce the release of DirectAdmin 1.53.1.
Hello,
DirectAdmin pleased to announce the release of DirectAdmin 1.53.1.
How to migrate from PHP 7.0 to PHP 7.2 in five minutes.
We use Ondřej Surý’s awesome PHP PPA. It already has PHP 7.2, so we’ll add the PPA and update the package information.
Ubuntu
add-apt-repository ppa:ondrej/php apt-get update
Debian
apt install apt-transport-https lsb-release ca-certificates wget -O /etc/apt/trusted.gpg.d/php.gpg https://packages.sury.org/php/apt.gpg sh -c 'echo "deb https://packages.sury.org/php/ $(lsb_release -sc) main" > /etc/apt/sources.list.d/php.list' apt-get update
This only applies if you are upgrading from a previous version. Note down the current PHP packages you have, so we can reinstall them for PHP 7.2.
dpkg -l | grep php | tee packages.txt
This will save your current packages to packages.txt file in your working directory.
apt-get install php7.2 php7.2-common php7.2-cli php7.2-fpm
This will install the bare basic packages you’d need to get started with PHP 7.2. Note that php7.2-fpm package is used for your web server integration. If you are using Apache with prefork MPM (type apachectl -V to see the MPM used), you’d need to install libapache2-mod-php7.2 instead of php7.2-fpm.
Take a look at the packages.txt file we created at step 2, and install the additional PHP packages. Your packages.txt file will show packages such as php7.0-mbstring, and you need to install their PHP 7.2 counterpart (php7.2-mbstring for example).
You can generate a command that can be run later using this line.
apt-get install $(cat packages.txt | awk '{ apt-get install gsub("7.0", "7.2", $2); print $2 }' | tr '\n' ' ' | sed 's/php7.2-mcrypt //g')
Before we remove the old PHP packages, make sure that your web server correctly uses the PHP 7.2 sockets/modules. If you installed php7.2-fpm above, and using Apache, a2enconf php7.2-fpm will make Apache use PHP 7.2 FPM. Type a2disconf php7.0-fpm to disable existing FPM configurations.
You can disable the current PHP integration with a2dismod php7.0 (or your current version) and enable new PHP 7.2 module with a2enmod php7.2.
If everything is working well (check your phpinfo() and php -i), you can remove the old packages:
apt-get purge php7.0*
Of course, change php7.0 with all old versions you no longer need.
Enjoy your shiny new PHP 7.2!
Continue reading “ACME v2 and Wildcard Certificate Support is Live”
Magento is an open-source e-commerce platform written in PHP. The software was originally developed by Varien, Inc, a US private company headquartered in Culver City, California, with assistance from volunteers.
Continue reading “How to install latest Magento 2 CMS in Debian 9”
PHP 7.2.7 Release Announcement
The PHP development team announces the immediate availability of PHP 7.2.7. This is a primarily a bugfix release which includes a segfault fix for opcache.
PHP 7.2 users are encouraged to upgrade to this version.
DMARC, which stands for “Domain-based Message Authentication, Reporting & Conformance”, is an email authentication, policy, and reporting protocol. It builds on the widely deployed SPF and DKIM protocols, adding linkage to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders, to improve and monitor protection of the domain from fraudulent email.
DMARC policies are published in the public Domain Name System (DNS), and available to everyone. Because the specification is available with no licensing or similar restriction, any interested party is free to implement it.
Continue reading “DirectAdmin: Adding a DMARC record to help lower your spam score”
Hello,
We’re pleased to announce the 1.53.1 release candidate for DirectAdmin:
Version: 1.53.1 RC1
All features and fixes are listed here:
https://www.directadmin.com/versions…rsion=1.531000
If you find any issues, please reply here with reports (rather than tickets or email, unless requested) to avoid duplicate reports.
The biggest new feature will be the LetsEncrypt wildcard certificates.
NOTE: To use it, you must enable dns_ttl=1 for per-record TTL settings, or else the LE Wildcard checkbox won’t show up.
If all goes well, the full/stable release is slated for June 26th.
To download this version, please grab the pre-release binaries:
https://help.directadmin.com/item.php?id=408
John
Hello
I’m running Debian 8 (Jessie).
Last week I updated the server and got an error:
● systemd-sysctl.service - Apply Kernel Variables Loaded: loaded (/lib/systemd/system/systemd-sysctl.service; static) Active: failed (Result: exit-code) since Thu 2018-06-07 17:47:02 EEST; 2min 1s ago Docs: man:systemd-sysctl.service(8) man:sysctl.d(5) Process: 1907 ExecStart=/lib/systemd/systemd-sysctl (code=exited, status=1/FAILURE) Main PID: 1907 (code=exited, status=1/FAILURE) Jun 07 17:47:02 kvm1.prado.lt systemd[1]: systemd-sysctl.service: main process exited, code=exited, status=1/FAILURE Jun 07 17:47:02 kvm1.prado.lt systemd[1]: Failed to start Apply Kernel Variables. Jun 07 17:47:02 kvm1.prado.lt systemd[1]: Unit systemd-sysctl.service entered failed state.
then, I checked that the journald daemon has collected by using the journalctl command
journalctl -xn -- Logs begin at Thu 2018-04-19 01:13:40 EEST, end at Thu 2018-06-07 17:52:19 EEST. -- Jun 07 17:52:12 kvm1.prado.lt systemd-sysctl[2467]: Failed to write '262144' to '/proc/sys/vm/max_map_count': Permission denied Jun 07 17:52:12 kvm1.prado.lt systemd[1]: systemd-sysctl.service: main process exited, code=exited, status=1/FAILURE Jun 07 17:52:12 kvm1.prado.lt systemd[1]: Failed to start Apply Kernel Variables. -- Subject: Unit systemd-sysctl.service has failed -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit systemd-sysctl.service has failed. -- -- The result is failed. Jun 07 17:52:12 kvm1.prado.lt systemd[1]: Unit systemd-sysctl.service entered failed state. Jun 07 17:52:19 kvm1.prado.lt systemd[1]: Starting Apply Kernel Variables... -- Subject: Unit systemd-sysctl.service has begun with start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit systemd-sysctl.service has begun starting up. Jun 07 17:52:19 kvm1.prado.lt systemd[1]: Failed to reset devices.list on /system.slice/systemd-sysctl.service: No such file or directory Jun 07 17:52:19 kvm1.prado.lt systemd-sysctl[2506]: Failed to write '262144' to '/proc/sys/vm/max_map_count': Permission denied Jun 07 17:52:19 kvm1.prado.lt systemd[1]: systemd-sysctl.service: main process exited, code=exited, status=1/FAILURE Jun 07 17:52:19 kvm1.prado.lt systemd[1]: Failed to start Apply Kernel Variables. -- Subject: Unit systemd-sysctl.service has failed -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit systemd-sysctl.service has failed. -- -- The result is failed. Jun 07 17:52:19 kvm1.prado.lt systemd[1]: Unit systemd-sysctl.service entered failed state.
To load all configuration files manually, execute
sysctl --system
Once the command has been successfully executed, I found where the problem is.
* Applying /etc/sysctl.d/99-sysctl.conf ... * Applying /usr/lib/sysctl.d/elasticsearch.conf ... sysctl: permission denied on key 'vm.max_map_count' * Applying /etc/sysctl.conf ...
Now it’s time to open the file /usr/lib/sysctl.d/elasticsearch.conf where we will need to comment one line and problem should be solved.
We should change one line from
vm.max_map_count=262144
to
#vm.max_map_count=262144
Now we should to restart a service using the command
systemctl restart systemd-sysctl.service
And now we can make sure the service is up and running properly using the command
status systemd-sysctl.service ● systemd-sysctl.service - Apply Kernel Variables Loaded: loaded (/lib/systemd/system/systemd-sysctl.service; static) Active: active (exited) since Wed 2018-06-13 22:29:05 EEST; 5s ago Docs: man:systemd-sysctl.service(8) man:sysctl.d(5) Process: 31532 ExecStart=/lib/systemd/systemd-sysctl (code=exited, status=0/SUCCESS) Main PID: 31532 (code=exited, status=0/SUCCESS)
DNSSEC is a tool used to verify the validity of a dns lookup.
You can enable this feature in DirectAdmin 1.44.1 and newer by typing:
cd /usr/local/directadmin/scripts ./dnssec.sh install
After the command has been successfully executed. Please add the following to the ‘options { …. }’ section of your /etc/bind/named.conf.options:
dnssec-enable yes; dnssec-validation yes; dnssec-lookaside auto; bindkeys-file "/etc/bind/named.iscdlv.key";
which should confirm if your named.conf is set, and will enable the dnssec=1 in the directadmin.conf automatically. If the script thinks you’re missing anything from your named.conf, it will tell you what to add.
To enable DNSSEC on a domain, go to:
Admin Level -> DNS Admin -> prado.lt
1. Click “Generate Keys”
2. then click “Sign”
3. You should now see values at the bottom of the zone. Copy the 2 DS records, and paste them into your domain registrar’s website.
If you have any subdomains created as full domains, you’ll need to follow extra steps to continue the chain of trust up the line into the main domain’s zone. For normal subdomains created under a domain, no extra action is required, as they’re part of the domain’s normal zone.
CVE stands for Common Vulnerabilities and Exposure. It’s a dictionary of publicly known information security vulnerabilities and exposures.
CVE’s common identifiers enable data exchange between security products and provide a baseline index point for evaluating coverage of tools and services.
Continue reading “CentOS 7: Check if a system is vulnerable to a CVE”