Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
The BIND DNS server has already been deprecated and removed from Plesk for Windows.
If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
If not, you can try explaining this to your PCI vendor.
Failing that, who utilizes ssh in your server? You may need to change SSH to a different port or implement port knocking till an update comes available. Alternatively, you could add a firewall rule to only allow certain IPs access to SSH.
Thanks, but no, that does not apply. My issues is described in CVE-2017-15906. IP blocking will not work for me because we have drivers on the road accessing over public networks.
I might add that the failure is not a result of penetration testing. The failure is generated by a simple check of the OpenSSH version number. Otherwise, the server passes all other PCI checks.
Why on earth would I ever want to implement port knocking to simply to pass a PCI test designed for my protection when all I have to do is implement a security update which is unavailable to plesk because the maintainers only support an outdated library?
@Mark Patterson We had this previously, but we have RedHat backported fixes and do also use IP Blocking for SSH.
We did find this related post elsewhere, which works. It is edited and our own current output is shown FYI:
"...Every PCI scanning company has different methods, but typically you can contest the result as a False Positive.
Provide them with your current OS version, SSH version and when it was installed. You can use:
Code:
rpm -qa --last|grep "name"
Where name is the name of the rpms for the service in which you are interested. In this case "openssh".
Send them this data. This is usually sufficient in most cases..."
Code:
# rpm -qa --last|grep "openssh"
openssh-clients-7.4p1-13.el7_4.x86_64 Sat 21 Oct 2017 04:29:59 BST
openssh-server-7.4p1-13.el7_4.x86_64 Sat 21 Oct 2017 04:29:47 BST
openssh-7.4p1-13.el7_4.x86_64 Sat 21 Oct 2017 04:29:36 BST
October 2017 was the last, important RedHat backported bug fix, but there is a new advisory one, which is THIS one.
We assume this will be coming in a distro - yum update soon. Official PCI compliance verification is often inconsistent
In sshd_config, I removed the line: Subsystem sftp /usr/libexec/openssh/sftp-server
and replaced it with: Subsystem sftp internal-sftp
Then I added the following rules to sshd_config, one for each user:
Match User username
ChrootDirectory /var/www/vhosts
AllowTCPForwarding no
I tried to be more specific with the ChrootDirectory, the server supports several domains, however that configuration did not work. So unfortunately, this method allows users to see all the directories in /vhosts. But, the user can only access that directory in which that user has permissions. So, internal security is maintained.
This solution is not ideal, but trustwave did approve my dispute allowing us to pass the PCI tests based on the actions listed above.