cPanel version 72, which we deployed to all servers about a week ago, has a couple of new features that I wanted to quickly highlight. The first of these adds the ability to setup Git repositories via Files -> Git Version Control in cPanel as seen below.
When creating a repository, you have the option to clone an existing one if desired. Once it has been created you’ll be provided with the SSH URL to access it. SSH (Shell) access will need to be enabled on the cPanel account and you’ll have to use the cPanel username and password to login.
On the topic of SSH access, a new in-browser terminal is also now available from directly within cPanel. This can be found under Advanced -> Terminal. We just activated this feature on our servers today due to a cPanel update now correctly launching these connections within CageFS. While I wouldn’t let it replace a desktop client for regular SSH access, it is certainly convenient to use on occasion since it is quickly accessible without having to do anything other than login to cPanel. SSH (Shell) access does have to be enabled on the cPanel account for the Terminal link to show up.
We hope you’re able to put these new features to good use and look forward to sharing more with you as further updates become available. Please don’t hesitate to submit a support ticket if we can be of any assistance with these features.
It has been a little while since our last behind the scenes update so I wanted to take a quick moment to share a few things.
Last week, we completed deployment of cPanel 70 to all of our servers. While there weren’t a lot of visible changes in this version, you may have noticed the new “Email Accounts” interface in cPanel.
To start, you’ll see the interface is now broken down into four different tabs that allow you to add email accounts, view / modify them, manage the default account, and manage other configuration settings. This page will default to the list view of email accounts where you’ll now see the “Access Webmail” link more prominently. You can now also select the “Manage Suspension” option to suspend or hold outgoing email for a single email account. Continue reading
We’re very excited to announce that on Monday, June 4th, we upgraded all of our hosting plans once again. All plans now include 50% more disk space and bandwidth than before, which can be seen on our website. This change applies to both new and existing clients free of charge. The additional resources are available for you to allocate via your WHM account effective immediately.
No compromises have been made to offer these additional resources. Our network connectivity continues to be of the same high quality and all data remains on pure SSD RAID 10 arrays. We hope that you’re able to use these additional resources to better serve your own clients and continue growing!
Although these Drupal vulnerabilities were posted to our script security forum, which we recommend you subscribe to, we wanted to give this situation as much visibility as possible. Over the past month there have been two critical Drupal updates released. Both of these address a remote code execution vulnerability, which is at the very top of the scale as far as severity is concerned. The most recent update was just released yesterday (April 25th) and further details on it can be found here. You need to make sure that your Drupal is updated to either version 7.59 or 8.5.3. Drupal 6 hasn’t been officially supported for more than 2 years and should be updated to at least 7.x.
The first vulnerability has been heavily targeted by bots for over a week now. We do have web application firewall (WAF) rules in place to defend against this but the WAF shouldn’t be considered a long term solution. The best option is always to update your scripts as soon as possible. Failure to do so may result in a complete compromise of the cPanel account in question. We’re still evaluating this latest vulnerability for inclusion in our WAF rules.
If you have any questions or run into any issues please drop us a ticket via our portal.
We’re happy to announce that PHP 7.2 is now available on all of our hosting servers. It is also now the default version of PHP for all newly created cPanel accounts. PHP 5.4, 5.5, 5.6, 7.0, and 7.1 remain available as alternative options using the “Select PHP Version” link from within cPanel. A short guide on the use of PHP Selector can be found here.
The PHP version for all existing cPanel accounts has not changed, though you can use PHP Selector to change this at any time.
PHP 7.2 comes with numerous improvements and new features such as
If your applications support PHP 7.2, we do recommend making the switch. PHP Selector makes this process very simple and you can easily revert to any prior version of PHP at any time, if needed.
As we reach the end of 2017, I wanted to give a quick update on what’s been happening here behind the scenes over the past few months.
In our previous post, we covered our switch from SpamTitan to SpamExperts as a paid inbound email filtering option. Over the past couple of months we’ve now also migrated all outbound email filtering from SpamTitan to a completely custom setup utilizing SpamAssassin, ClamAV, and other software. This now completes our migration away from SpamTitan and has resulted in far better email filtering accuracy.
We’ve also been working to expand our offsite backup capacity and were finally able to complete this a couple of weeks ago. This was done in preparation for our not so secret plan to once again increase all of our hosting plan limits for everyone in the near future. We hope to roll these changes out during the first quarter of 2018.
The cPanel 66 and 68 updates have come and gone as well. There really wasn’t too much included that you’d have noticed from an end user standpoint. cPanel 70 will be available soon and will be much of the same as it mainly focuses on bug fixes.
Most importantly, though, is that December 12th officially marked our 15th year in business! There aren’t many hosting companies out there that can claim that, let alone without a change in ownership. We’ve been a resource you can rely on for 15 years and fully intend to remain as such for many more years to come. Thank you all very much for your continued partnerships and we wish you all a very Happy New Year!
While the SpamTitan product has been great to us for the past four and a half years, it has become less effective at filtering out spam and the per email address pricing has always been a concern. Over the past several months, we have been hard at work preparing a better solution for you.
We are very proud to announce that we are now a SpamExperts partner. Not only has our testing shown them to be superior at spam filtering, we’re confident you’ll be pleased with the pricing as well. You no longer have to worry about how many email addresses are on your domain. In place of SpamTitan’s $1.00 per user we’re offering SpamExperts at $2.00 per domain. This has resulted in a significant cost reduction for many of our clients while also offering a better service.
We completed the migration of all SpamTitan users over to SpamExperts early last week and have since opened up the service offering for all clients. A free 30 day trial is available if you would like to give it a try, just submit a ticket to request it. Additional information can be found here.
We have quite a few other ongoing projects currently so stay tuned for more updates!
cPanel’s Web Disk feature allows you to easily manage your cPanel account files beyond what can be accomplished via FTP/SFTP or the file manager. In many cases, you can even have the account’s data show up as a local folder on your computer, making it very familiar to work with. With cPanel’s free Web Desk iOS app, you can also achieve this same connectivity from your iOS devices. Once you’ve downloaded the app, you can simply add the account that you wish to connect with.
Once you’ve saved your new server, you can simply select it to connect and you’ll immediately see the data that is on the account.
This interface allows you to perform all common tasks such as downloading, uploading, renaming, creating folders, etc. from the convenience of your phone. As iOS 11 is released with the new Files app, this should prove to be even more useful. Give it a try and let us know your thoughts!
A couple years ago, we published a post on the proper configuration of SPF records when sending emails through our servers. Although not a default configuration, this is very important when you’re enforcing validation of SPF using “-all”. Due to some internal changes, the required entry has changed a little. Previously, you needed to add an A record for spf.gzo.com (+a:spf.gzo.com) and now you’ll need to simply include spf.gzo.com (+include:spf.gzo.com). A screenshot of this entered correctly in cPanel is shown below.
For those with DNS hosted by us, your SPF record has already been updated with this change. If you’re not hosting your DNS with us, the existing A record will continue to function normally in the short term, but please be sure to make the necessary change. If you have any questions or concerns, please submit a ticket and we’ll be happy to assist.
It has been a little while since we posted an update on what we’re working on behind the scenes here at Dathorn, so I wanted to take a quick moment to share. While it is easy to notice new features or see us working on your helpdesk tickets, much of our work goes completely unnoticed. That is, after all, our goal. We try to perform all updates, maintenance, etc. without any impact to your service.
While software patches and security updates are an ongoing battle, there have been a few noteworthy items as of late. You may have already heard about “Stack Clash”, a local privilege escalation vulnerability present in most Linux and BSD systems. Fortunately, we were able to quickly protect our servers against this without any service interruption, thanks to KernelCare. Traditionally, such kernel updates would require a reboot of each server but that has long been a thing of the past for us.
A few security issues have also been addressed in OpenVPN, including a remote code execution vulnerability. While serious, all of our instances were patched immediately and the severity of this particular issue for us was much lower since we only use OpenVPN internally for accessing certain private resources, such as IPMI on our servers. This had a much greater impact on VPN providers. Continue reading