floyd
Verified User
- Joined
- Mar 29, 2005
- Messages
- 6,255
the hosting company disconnected the box
That's pretty lame. They could have easily logged in and at least stopped the attacks.
the hosting company disconnected the box
That's pretty lame. They could have easily logged in and at least stopped the attacks.
Nope, they did the right thing.
Ok well that is your opinion and here is mine. I know I can take 2 minutes out of my day to stop a process on a customer's machine who is paying me for a dedicated server even if its not managed.
So yes my opinion is that its pretty lame. I do have my own data center so I am in the same position as other companies who have networks to protect.
Given the choice which company would you rather host with? One that is just going to disconnect you at the first sign of trouble or one that will quickly resolve the problem for you so that you don't have any down time?
I understand if its a big problem that cannot easily be fixed. But even I with my limited experience and no professional training knew how to quickly fix this particular problem. Certainly a professional data center knows how to deal this problem as well. Its certainly better than disconnecting a customer's machine.
The most they really had to do was block outgoing ssh requests from his machine. Certainly that is better than disconnecting it. And it requires the same amount of effort, even less maybe.
Yes I think its lame of them to simply disconnect his machine or maybe I should call it what it is, lazy.
It's also far easier to unplug a cat5 than to troubleshoot a box that you are not paid to manage.
It's far easier to bash another while making yourself look good in this scenario of what you would do.
I agree with floyd the first step is to try to filter the attack before just pulling the plug. I would be pissed with any hosting I was paying for that just pulls the plug. And I will not host with any provider that does that. Last resort would need to be nullrouting the ip at router level.
I call it GoDaddy.Yes I think its lame of them to simply disconnect his machine or maybe I should call it what it is, lazy.
I call it GoDaddy.
They did that to a gent who is now a client of ours because we don't just disconnect servers.
Note: I have no idea if this poster uses GoDaddy or not; I'm just relating a specific experience.
Jeff
Sounds more like GoDaddy by the minute. But I believe GoDaddy only offers Plesk, so it's probably someone else.From what hik said they pulled the plug without giving him a way to look at the machine remotely
cd /usr/local/directadmin/scripts
wget -O roundcube.sh http://files.directadmin.com/services/all/roundcube.sh
./roundcube.sh
cp: cannot stat `/var/www/html/roundcube/temp/*': No such file or directory
ERROR 1142 (42000) at line 6 in file: 'SQL/mysql.update.sql': ALTER command denied to user 'da_roundcube'@'localhost' for table 'messages'
Editing roundcube configuration...
Roundcube has been installed successfully.
I have been affected and as a matter of fact the hosting company disconnected the box until I could find out what happened, due to the ssh attacks.
We suggest regular updates with "clean_old_webapps=yes" set in your options.conf file. DA doesn't automatically update things that require a service to be taken down and compiled. However the custombuild system makes this pretty simple.
What exactly does "clean_old_webapps=yes" do?
Matt
Deletes previous installs