Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
We value your experience with Plesk during 2025 Plesk strives to perform even better in 2026. To help us improve further, please answer a few questions about your experience with Plesk Obsidian 2025. Please take this short survey: https://survey.webpros.com/
Jan 19 12:09:15 h1980282 sshd[27961]: Accepted publickey for bmweb from xxx.xxx.xxx.xxx port 12493 ssh2
Jan 19 12:09:15 h1980282 sshd[27961]: pam_unix(sshd:session): session opened for user bmweb by (uid=0) Jan 19 12:09:15 h1980282 sshd[27961]: error: ssh_selinux_setup_pty: security_compute_relabel: Invalid argument
Jan 19 12:09:15 h1980282 sshd[27964]: Received disconnect from xxx.xxx.xxx.xxx: 11: disconnected by user
Jan 19 12:09:15 h1980282 sshd[27961]: pam_unix(sshd:session): session closed for user bmweb
how come uid for this user is 0 ?
users that are configured to have chroot access will be unable to login via ssh "/bin/bash (chrooted)"
yeah sure...
i made a new policy that allows bash and integrated it in selinux
just like this...take a look into /var/log/messages (on RH Based Linux)
Jan 19 12:46:43 h1980282 plesk-chrootsh[4300]: execv("/bin/bash") failed
Jan 19 12:46:43 h1980282 plesk-chrootsh[4300]: system error: Permission denied
Jan 19 12:46:45 h1980282 setroubleshoot: SELinux is preventing /usr/local/psa/bin/chrootsh from execute access on the file /var/www/vhosts/***/lib64/ld-linux-x86-64.so.2. For complete SELinux messages. run sealert -l d0a4c45a-b7c6-4472-b299-37087e8e0018
execute the command sealert -l d0a4c45a-b7c6-4472-b299-37087e8e0018
For Example you will get some output like:
SELinux is preventing /usr/local/psa/handlers/hooks/dk_check from read access on the fifo_file fifo_file.
If you believe that dk_check should be allowed read access on the fifo_file fifo_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep dk_check /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
If you want to ignore dk_check trying to read access the fifo_file fifo_file, because you believe it should not need this access.
Then you should report this as a bug.
You can generate a local policy module to dontaudit this access.
Do
# grep /usr/local/psa/handlers/hooks/dk_check /var/log/audit/audit.log | audit2allow -D -M mypol
# semodule -i mypol.pp
do both commands but be sure to use a more specific policy name than just mypol
the following semodule command will take some seconds to finish.