RSS种子
最近更新
Jul
21
Linux 虚拟主机维护 Emergency maintenance on our Linux Hosting Servers
发布人 Muyu Gu 发表于 21 July 2017 07:31 PM

维护通知:

以下Linux虚拟主机将会进行一次维护,维护原因和计划如下:

 

Maintenance Notice :

Please be advised that the following Linux hosting servers will be undergoing maintenance as per the schedule and reason mentioned below.

原因:

升级cpanel版本到 62

Reason :

Upgrade cPanel to version 62

 维护时间:

日期 : 2017年7月22号

开始时间: 02:15 AM 北京时间

持续时间:3个小时

Maintenance Window :

Date : 21st July 2017

Start Time: 11:45 PM IST

Duration : 3 hours

维护服务器:

cp-50.webhostbox.net

md-90.webhostbox.net


Servers :

cp-50.webhostbox.net

md-90.webhostbox.net

 受影响的服务:

维护完成需要进行服务器重启,所有服务器相关服务将会下线5分钟左右,

您如果有任何疑问请及时与我们售后支持联系,感谢您对bluehost的支持。

Affected Services :

All services will be down for 5 minutes when cPanel update restarts them.

Please feel free to contact our support helpdesk in case you have any queries.


查看更多 »



Jun
30

Maintenance Notice /维护通知:

Please be advised that the following Windows servers will be undergoing maintenance in batches as per the schedule and reason mentioned below.

请注意,我们将按照下面的时间表中的时间以及原因对以下Windows服务器进行批量维护。

 

Reason/原因 :

Patching Windows Servers

Windows服务器漏洞修复

Benefits of this upgrade/升级的好处:

  • Enhances the security of the server.  /增强服务器的安全性。
  • Protect against vulnerabilities and security exploits.  /防范漏洞和安全漏洞。
  • Improves the server performance.  /提高服务器性能。

Maintenance Window/维护服务器列表:

Batch 1 / 第一批:

Server Day and Date Start Time (Beijing) Duration
md-plesk-web2.webhostbox.net Saturday, 1st July 2017 2:00 5 Hours

Batch 2 / 第一批: :

Server Day and Date Start Time (IST) Duration
md-plesk-web5.webhostbox.net Saturday, 2st July 2017 2:00 5 Hours
mdus-pp-wb13.webhostbox.net Saturday, 2st July 2017 2:00 5 Hours
mdin-pp-wb4.webhostbox.net Saturday, 2st July 2017 2:00 5 Hours
mdin-pp-wb5.webhostbox.net Saturday, 2st July 2017 2:00 5 Hours

Batch 3 / 第一批 :

Server Day and Date Start Time (IST) Duration
mdus-pp-wb14.webhostbox.net Sunday, 3nd July 2017 2:00 5 Hours
bh-plesk-mssql1.webhostbox.net Sunday, 3nd July 2017 2:00 5 Hours

  

Affected Services/受影响的服务:

All services will be down./ 所有这些服务器上的服务器都会在这时间内无法登录

 

Note: Though the maintenance window is 5 hours, the service will be only unavailable during the reboots and there might be subsequent reboots.

注意:维护时间虽然长达5小时,但是服务只有在重启服务器期间不可用,并且服务器可能会出现多次重启


Please feel free to contact our support helpdesk in case you have any queries.

请您及时做好备份,以免发生资料的丢失。如果您有任何疑问和问题,请及时和我们售后技术团队联系,谢谢您的理解和配合。


查看更多 »



Jun
30

A new kernel & glibc Stack Guard security vulnerability (CVE-2017-1000364) has been reported by RedHat.

RedHat已经报告了一个新的内核和glibc Stack Guard安全漏洞(CVE-2017-1000364)。



Information /信息:
A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system.

在用户空间二进制文件的堆栈中分配内存的方式发现了一个缺陷。 如果堆(或不同的内存区域)和堆栈内存区域彼此相邻,则攻击者可以使用此缺陷跳过堆栈保护间隙,从而导致进程堆栈或相邻内存区域受到控制的内存损坏,从而在系统上增加其权限。

 

You can refer to the following link for more details:

有关详细信息,请参阅以下链接:

****
https://access.redhat.com/security/cve/cve-2017-1000364
****

>>How to find out whether your server is vulnerable or not?

>>如何确定您的服务器是否易受攻击?


1. Download the latest vulnerability detection script from https://access.redhat.com/security/vulnerabilities/stackguard from the Diagnose tab

下载最新的诊断漏洞的检测脚本: https://access.redhat.com/security/vulnerabilities/stackguard

2. run it on your server.

2.在您的服务器上运行它


>>How to fix the Vulnerability?

>>如何修复漏洞?

  

Debian/Ubuntu

Update and upgrade your packages using apt-get.

使用apt-get更新和升级您的软件包。

----
#apt-get update && sudo apt-get dist-upgrade

----

 

You'll need to reboot your server to apply the changes.

您需要重新启动服务器才能使这些应用生效。

----
#reboot

----

 

CentOS

Using either of the two methods mentioned below:

使用西面提到的两种方式中的任意一种:

1. You can initiate a full yum update using the below command:

你可以使用以下命令启动完成的YUM更新

----

yum update

----

OR/或者

2. just update the kernel and glibc packages:
只需更新 kernel和glibc软件包:

----
yum update "kernel*"
yum update "glibc"

----

You'll need to reboot your server to apply the changes.

您需要重新启动服务器才能使这些应用生效。

----

#reboot

----


Please feel free to contact our support helpdesk in case you have any queries.

请您及时做好备份,以免发生资料的丢失。如果您有任何疑问和问题,请及时和我们售后技术团队联系,谢谢您的理解和配合。


查看更多 »



Jun
23

Update [27-06-2017, 15:30]

The service has been restarted on all the servers.

服务已经在所有的服务器上重启

SSH access has been re-enabled in all our servers.

SSH可以重新在我们的服务器上使用

Please feel free to contact our support helpdesk in case you have any queries.

如果您存在任何疑问,请您随时与我们联系。

=========================

 

Update [23-06-2017, 13:00 Beijing]

更新 [23-06-2017, 13:00 北京]

We have enabled the "crontab" on all the Linux Shared servers.

我们已经在所有的Linux服务器上启用了"crontab"

The server will not be accessible via "SFTP". Please use "FTP" on SItelock and Codeguard configuration, since SFTP will not be accepted on the server.

服务器依然不能通过SFTP进入到服务器,由于目前SFTP的模式无法在服务器上使用,请在Sitelock的设置中使用FTP的模式来进行登录。

We are working on patching the servers with the latest update and re-enable ssh access.

我们正在使用最新的更新来修补服务器,并重新启用ssh访问。

Please watch this forum post for further updates.

请持续关注该通知,来获取最新的更新。

 

===========================

With immediate effect, we have disabled "SSH access" on all Linux servers due to the recent Linux vulnerability CVE-2017-1000364.

由于最近的Linux漏洞CVE-2017-1000364,我们已禁用所有Linux服务器上的“SSH访问”。

We have also disabled "crontab" on all shared servers as a security enhancement.

同时,我们为了增强安全性,已经在所有虚拟主机上禁用“crontab”。

 

You can refer the following link for more details:

您可以通过如下链接来获取更多的信息

****

https://access.redhat.com/security/cve/cve-2017-1000364

****

We will be patching the servers with the latest update and re-enable SSH access on the servers. The servers will be rebooted post the server update.

我们将使用最新的补丁来修改该服务器漏洞,在修复后将再次启用SSH的服务,服务器将会在更新后进行重启。

 

Meanwhile, we recommend you to use cPanel and FTP to manage your files.

同时,我们建议您使用cPanel和FTP来管理您的文件。

 

Please feel free to contact our support helpdesk in case you have any queries.

如果您存在任何疑问,请您随时与我们联系。


查看更多 »



Jun
20

Maintenance Notice /维护通知:

Please be advised that the following Linux hosting servers will be undergoing maintenance as per the schedule and reason mentioned below.

 尊敬的用户您好,以下Linux 虚拟主机服务器将会进行一次定期维护, 维护原因和时间如下:

Reason /原因:

Migrate users from CloudLinux 5 to CloudLinux 6 servers.

将用户从CloudLinux 5 迁移到 CloudLinux 6

 

Benefits of this Migration /迁移后的改善:

- CloudLinux 6 supports TLS v1.2 which is mandatory for Payment gateway communication.

- CloudLinux 6 将支持 TLS v1.2,可以满足支付相关服务的要求。

- CloudLinux 6 supports SNI

- CloudLinux 6 支持 SNI

- CloudLinux 6 has more enhanced security features

-CloudLinux 6 将更加的安全

 

Maintenance Window:

Server Day and Date Start Time (Beijing) Duration
md-8.webhostbox.net Wednesday, 21st Jun 2017 22:30 6 hours
md-9.webhostbox.net Wednesday, 21st Jun 2017 22:30 6 hours

 

服务器 日期与时间 开始时间(北京) 持续时间
md-8.webhostbox.net 2017年6月21日 星期三 22:30 6 小时
md-9.webhostbox.net 2017年6月21日 星期三 22:30 6 小时

 

Affected Services/受影响的服务:

All services will be down.

所有的服务将被关闭

 

Note: cPanel/WHM and Webmail services will be stopped on June 21, 16:30 Beijing, Friday. Clients will not be able to login to cPanel/WHM and webmail interface, till the migration is complete.

请注意:cPanel/WHM & Webmail 服务将在6月16日周五下午16:30分(北京时间)被停止,若您的网站在该服务器上,您在该期间将无法登录cPanel和webmail 一直到维护结束。

 

Please feel free to contact our support helpdesk in case you have any queries.

请您及时做好备份,以免发生资料的丢失。如果您有任何疑问和问题,请及时和我们售后技术团队联系,谢谢您的理解和配合。


查看更多 »