• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Resolved 12.0 to onyx upgrade - problem with login

Tempest

New Pleskian
Hi,

I ran the auto upgrade from 12.0 to onyx, it seemed to have completed fine, more or less.

The websites are running fine (or even better - faster), ftp's work fine etc., however, I cannot log in to the pesk panel at all.

Has anyone experienced anything like it?

Many thanks,
Peter
 
Thank you for the clues.

When I go to :8443 page, nothing shows up, as if the domain did not exist.
I tried rebooting the server but no joy.

So it looks like the plesk does not work, however since the upgrade I keep receiving admin emails from plesk about updates:
"Package Update Manager notification
The following package updates are available:
- accountsservice 0.6.35-0ubuntu7.3 from Ubuntu for trusty-updates by Ubuntu repo (currently installed version: 0.6.35-0ubuntu7.1 from now repo)
(and here goes a long list of the packages)
You can update these packages in System Updates: https://xxx:8443/admin/pum"

However, if I click on this link, nothing shows up ("Problem loading page, unable to connect).




As for your other suggestions, how would I do
# plesk repair installation
or
# service sw-cp-server restart
?
 
As for your other suggestions, how would I do
# plesk repair installation
or
# service sw-cp-server restart
?

You cannot reach the Plesk GUI, because most likely Plesk web server is not running.
You must login via SSH to your Linux console, then switch to superuser (# su) then enter the commands. The "#" is a prompt sign only quoted to clarify that the command is a command to enter on the console. Do not include that in the command.
 
Thank you for that Peter.

There was an error during the repair and the sw-cp restart didn't succeed. Here's a final screenshot.ssh2.jpg
 
Check the ssl_ciphers line in /etc/sw-cp-server/conf.d/ssl.conf and remove the duplicate line. If there are different entries, keep the one with the most entries. Then try restarting sw-cp-server again.
 
there are only three lines in the file. couldn't find any duplicates in my understanding.
could you advise on how that line should look like, please?
 

Attachments

  • ssh3.jpg
    ssh3.jpg
    6.4 KB · Views: 2
Please run
# grep -R ssl_ciphers /etc/sw-cp-server/*
to identify the file where the other ssl_ciphers directive is listed. It is probably in /etc/sw-cp-server/config. The /etc/sw-cp-server/conf.d/ssl.conf is included in the config file, so if there is an ssl_ciphers directive in the config file, one of the two is too many. The line from your screenshot is correct, so if you find the same line or similar in the /config file or elsewhere, you can safely remove that. It is still a good idea to make a backup of a file that you edit, before apply changes.
 
the only other ssl_ciphers line was found in /pci-compliance.conf file, and this one does have more entries.
In the previous post you advised to remove the one with less entries, does this mean it's better to leave the in /pci-compliance.conf as it is, and remove the ssl_ciphers line in ssl.conf?
 

Attachments

  • ssh4.jpg
    ssh4.jpg
    21.5 KB · Views: 1
Basically, yes, but also no. If the pci-compliance.conf file is present, an "add-on" configuration was done, because that file is not standard. It is an enhanced security measure. Personally, I'd probably rather revert back to the default to get the server up and running again, then think about enhancing security later. The default setup is "secure", it is just not "perfectly secure".

You can try either way. Maybe you would simply want to copy the pci-compliance.conf into a backup (outside the directory!) and remove the pci-compliance.conf file. Then check whether sw-cp-server can be started.
 
Back
Top