<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Dewlance&reg; Forum - Security Issue]]></title>
		<link>https://www.dewlance.com/forum/</link>
		<description><![CDATA[Dewlance&reg; Forum - https://www.dewlance.com/forum]]></description>
		<pubDate>Mon, 11 May 2026 22:49:45 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[How to keep your hosting account secure?]]></title>
			<link>https://www.dewlance.com/forum/Thread-How-to-keep-your-hosting-account-secure</link>
			<pubDate>Sun, 04 Sep 2016 11:45:58 -0400</pubDate>
			<dc:creator><![CDATA[<a href="https://www.dewlance.com/forum/member.php?action=profile&uid=1">DewlanceCTO</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.dewlance.com/forum/Thread-How-to-keep-your-hosting-account-secure</guid>
			<description><![CDATA[Security of your hosting account is most important, Here at Dewlance we take all measure to secure accounts/data of customer however today I am going to give tips for securing your hosting account.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1.</span> If possible then do not use your default email account, Use secondary account which is unknown for public and make sure you check your account regularly so you can't miss any invoice.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2.</span> Use secure password, Any password like test, etc is insecure and it will be easy to guess your password.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3.</span> If you are using gmail type email and they provide 2 step authentication then enable it so hackers can not hack your account.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">4.</span> Login from your local IP Address and If possible then never use dynamic IP or random IP Address. If you use static IP of your local ISP then your hosting provider will be assured that you always access from a xyz IP and If hacker open any ticket with your hosting provider for resetting your password then they will deny to reset password by looking at their IP Address.<br />
<br />
There is more way to make your account secure.]]></description>
			<content:encoded><![CDATA[Security of your hosting account is most important, Here at Dewlance we take all measure to secure accounts/data of customer however today I am going to give tips for securing your hosting account.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1.</span> If possible then do not use your default email account, Use secondary account which is unknown for public and make sure you check your account regularly so you can't miss any invoice.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2.</span> Use secure password, Any password like test, etc is insecure and it will be easy to guess your password.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3.</span> If you are using gmail type email and they provide 2 step authentication then enable it so hackers can not hack your account.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">4.</span> Login from your local IP Address and If possible then never use dynamic IP or random IP Address. If you use static IP of your local ISP then your hosting provider will be assured that you always access from a xyz IP and If hacker open any ticket with your hosting provider for resetting your password then they will deny to reset password by looking at their IP Address.<br />
<br />
There is more way to make your account secure.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Xen Venom Vulnerability]]></title>
			<link>https://www.dewlance.com/forum/Thread-Xen-Venom-Vulnerability</link>
			<pubDate>Mon, 18 May 2015 04:37:04 -0400</pubDate>
			<dc:creator><![CDATA[<a href="https://www.dewlance.com/forum/member.php?action=profile&uid=1">DewlanceCTO</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.dewlance.com/forum/Thread-Xen-Venom-Vulnerability</guid>
			<description><![CDATA[Hello,<br />
<br />
Our customers don't need to worry about this vulnerability, We're already applied a patch on our all servers.<br />
<br />
<br />
Thanks,<br />
Kunnu]]></description>
			<content:encoded><![CDATA[Hello,<br />
<br />
Our customers don't need to worry about this vulnerability, We're already applied a patch on our all servers.<br />
<br />
<br />
Thanks,<br />
Kunnu]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to Disable SSLv3 on cPanel/Lighttpd/SolusVM/Lighttpd?]]></title>
			<link>https://www.dewlance.com/forum/Thread-How-to-Disable-SSLv3-on-cPanel-Lighttpd-SolusVM-Lighttpd</link>
			<pubDate>Sun, 19 Oct 2014 02:37:02 -0400</pubDate>
			<dc:creator><![CDATA[<a href="https://www.dewlance.com/forum/member.php?action=profile&uid=1">DewlanceCTO</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.dewlance.com/forum/Thread-How-to-Disable-SSLv3-on-cPanel-Lighttpd-SolusVM-Lighttpd</guid>
			<description><![CDATA[Hello,<br />
<br />
If you are using a cPanel/WHM then immediately disable SSLv3 on your server because of SSLv3 is not anymore secure.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to Disable SSLv3 on cPanel/Apache via SSH Command?</span></span><br />
Type this command in your SSH Client:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>cd /usr/local/apache/conf/includes</blockquote>
<br />
Edit pre_main_global.conf file<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>nano pre_main_global.conf</blockquote>
<br />
Now copy and paste this code in this file.<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>SSLHonorCipherOrder On<br />
SSLProtocol -All +TLSv1</blockquote>
<br />
Save file and exit then restart your apache server<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>service httpd restart</blockquote>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">How to test for poddle SSLv3 Attack?</span></span><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to Disable SSLv3 on Lighttpd or SolusVM Master Server?</span></span><br />
Note: SolusVM use Lighttpd Webserver so we need to disable SSLv3 on SolusVM Master and Slave Server<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Edit ligghttpd.conf file</span><br />
<blockquote class="mycode_quote"><cite>Quote:</cite>nano /etc/lighttpd/lighttpd.conf</blockquote>
<br />
Search <span style="font-weight: bold;" class="mycode_b">ssl.engine</span> code and enter this code before bracket close <span style="font-weight: bold;" class="mycode_b">}</span> and after "ssl.ca-file" line.<br />
<div class="codeblock phpcodeblock"><div class="title">PHP Code:</div><div class="body"><div dir="ltr"><code><span style="color: #FF8000">#SSL&nbsp;Poddle&nbsp;v3&nbsp;attack<br /></span><span style="color: #0000BB">ssl</span><span style="color: #007700">.use-</span><span style="color: #0000BB">sslv2&nbsp;</span><span style="color: #007700">=&nbsp;</span><span style="color: #DD0000">"disable"<br /></span><span style="color: #0000BB">ssl</span><span style="color: #007700">.use-</span><span style="color: #0000BB">sslv3&nbsp;</span><span style="color: #007700">=&nbsp;</span><span style="color: #DD0000">"disable"&nbsp;<br /></span></code></div></div></div><br />
<br />
Here is example code:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>&#36;SERVER["socket"] == "0.0.0.0:443" {<br />
ssl.engine = "enable"<br />
ssl.pemfile = "/usr/local/solusvm/ssl/solusvm.pem"<br />
ssl.ca-file = "/usr/local/solusvm/ssl/solusvm.ca-bundle"<br />
<br />
#SSL Poddle v3 attack<br />
ssl.use-sslv2 = "disable"<br />
ssl.use-sslv3 = "disable"<br />
}</blockquote>
<br />
and<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>#If any other custom port is listed then also you need to disable SSLv2,V3 on your custom port<br />
&#36;SERVER["socket"] == "0.0.0.0:customport" {<br />
ssl.engine = "enable"<br />
ssl.pemfile = "/usr/local/solusvm/ssl/solusvm.pem"<br />
ssl.ca-file = "/usr/local/solusvm/ssl/solusvm.ca-bundle"<br />
<br />
#SSL Poddle v3 attack<br />
ssl.use-sslv2 = "disable"<br />
ssl.use-sslv3 = "disable"<br />
}</blockquote>
<br />
<span style="font-weight: bold;" class="mycode_b">[b]Restart lighttpd:</span>[/b]<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>service lighttpd restart</blockquote>
<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to Disable SSLv3 on SolusVM Slave?</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Edit ligghtpd.conf</span><br />
nano /etc/lighttpd/lighttpd.conf<br />
<br />
and enter this code at end of file.<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>ssl.use-sslv2 = "disable"<br />
ssl.use-sslv3 = "disable"</blockquote>
<br />
<span style="font-weight: bold;" class="mycode_b">Save file and restart lighttpd</span><br />
<span style="font-weight: bold;" class="mycode_b">service lighttpd restart</span><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to test that you are safe from poodle attack?</span></span><br />
Visit <a href="https://www.ssllabs.com/ssltest/" target="_blank" rel="noopener" class="mycode_url">https://www.ssllabs.com/ssltest/</a> and enter your Master SolusVM Website Address and click on test. If show SSLv3 is supported then it means your server is vulnerable for SSLv3 attack.<br />
<br />
If you want to check your SolusVM Slave Server then you need to enter your slave server IP Address and ssl port number. Eg:  <a href="https://12" target="_blank" rel="noopener" class="mycode_url">https://12</a>.3.4.5:port<br />
<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to Disable this in Lighttpd?</span></span><br />
You can follow our SolusVM SSLv3 Tutorial because of SolusVM use Lighttpd Webserver however I am writing this tutorial for you so you can easily understand this.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Enter this command in your SSH Client</span><br />
<blockquote class="mycode_quote"><cite>Quote:</cite>nano /etc/lighttpd/lighttpd.conf</blockquote>
<br />
In lighttpd.conf enter this command in your &#36;SERVER["socket"] == ":443" line but don't forget to enter this after <span style="font-weight: bold;" class="mycode_b">{ </span> bracket start and before <span style="font-weight: bold;" class="mycode_b">}</span> bracket close line.<br />
<br />
<br />
Here is example:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>&#36;SERVER["socket"] == ":443" {<br />
  ssl.engine = "enable"<br />
  ssl.pemfile = var.confdir + "/example.org.pem"<br />
  ssl.ca-file = var.confdir + "/example.org.bundle.crt"<br />
  server.name = var.confdir + "/example.org"<br />
  server.document-root = "/srv/html"<br />
  ssl.use-sslv2 = "disable"<br />
  ssl.use-sslv3 = "disable"</blockquote>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Save your file and then restart ligghtpd.</span><br />
<blockquote class="mycode_quote"><cite>Quote:</cite>service lighttpd restart</blockquote>
<br />
<br />
Note: "service ligghtpd restart" command works on CentOS but If you are using any other Operating system then you need to search in google on how to restart lighttpd on your xyz operating system]]></description>
			<content:encoded><![CDATA[Hello,<br />
<br />
If you are using a cPanel/WHM then immediately disable SSLv3 on your server because of SSLv3 is not anymore secure.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to Disable SSLv3 on cPanel/Apache via SSH Command?</span></span><br />
Type this command in your SSH Client:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>cd /usr/local/apache/conf/includes</blockquote>
<br />
Edit pre_main_global.conf file<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>nano pre_main_global.conf</blockquote>
<br />
Now copy and paste this code in this file.<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>SSLHonorCipherOrder On<br />
SSLProtocol -All +TLSv1</blockquote>
<br />
Save file and exit then restart your apache server<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>service httpd restart</blockquote>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">How to test for poddle SSLv3 Attack?</span></span><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to Disable SSLv3 on Lighttpd or SolusVM Master Server?</span></span><br />
Note: SolusVM use Lighttpd Webserver so we need to disable SSLv3 on SolusVM Master and Slave Server<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Edit ligghttpd.conf file</span><br />
<blockquote class="mycode_quote"><cite>Quote:</cite>nano /etc/lighttpd/lighttpd.conf</blockquote>
<br />
Search <span style="font-weight: bold;" class="mycode_b">ssl.engine</span> code and enter this code before bracket close <span style="font-weight: bold;" class="mycode_b">}</span> and after "ssl.ca-file" line.<br />
<div class="codeblock phpcodeblock"><div class="title">PHP Code:</div><div class="body"><div dir="ltr"><code><span style="color: #FF8000">#SSL&nbsp;Poddle&nbsp;v3&nbsp;attack<br /></span><span style="color: #0000BB">ssl</span><span style="color: #007700">.use-</span><span style="color: #0000BB">sslv2&nbsp;</span><span style="color: #007700">=&nbsp;</span><span style="color: #DD0000">"disable"<br /></span><span style="color: #0000BB">ssl</span><span style="color: #007700">.use-</span><span style="color: #0000BB">sslv3&nbsp;</span><span style="color: #007700">=&nbsp;</span><span style="color: #DD0000">"disable"&nbsp;<br /></span></code></div></div></div><br />
<br />
Here is example code:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>&#36;SERVER["socket"] == "0.0.0.0:443" {<br />
ssl.engine = "enable"<br />
ssl.pemfile = "/usr/local/solusvm/ssl/solusvm.pem"<br />
ssl.ca-file = "/usr/local/solusvm/ssl/solusvm.ca-bundle"<br />
<br />
#SSL Poddle v3 attack<br />
ssl.use-sslv2 = "disable"<br />
ssl.use-sslv3 = "disable"<br />
}</blockquote>
<br />
and<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>#If any other custom port is listed then also you need to disable SSLv2,V3 on your custom port<br />
&#36;SERVER["socket"] == "0.0.0.0:customport" {<br />
ssl.engine = "enable"<br />
ssl.pemfile = "/usr/local/solusvm/ssl/solusvm.pem"<br />
ssl.ca-file = "/usr/local/solusvm/ssl/solusvm.ca-bundle"<br />
<br />
#SSL Poddle v3 attack<br />
ssl.use-sslv2 = "disable"<br />
ssl.use-sslv3 = "disable"<br />
}</blockquote>
<br />
<span style="font-weight: bold;" class="mycode_b">[b]Restart lighttpd:</span>[/b]<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>service lighttpd restart</blockquote>
<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to Disable SSLv3 on SolusVM Slave?</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Edit ligghtpd.conf</span><br />
nano /etc/lighttpd/lighttpd.conf<br />
<br />
and enter this code at end of file.<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>ssl.use-sslv2 = "disable"<br />
ssl.use-sslv3 = "disable"</blockquote>
<br />
<span style="font-weight: bold;" class="mycode_b">Save file and restart lighttpd</span><br />
<span style="font-weight: bold;" class="mycode_b">service lighttpd restart</span><br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to test that you are safe from poodle attack?</span></span><br />
Visit <a href="https://www.ssllabs.com/ssltest/" target="_blank" rel="noopener" class="mycode_url">https://www.ssllabs.com/ssltest/</a> and enter your Master SolusVM Website Address and click on test. If show SSLv3 is supported then it means your server is vulnerable for SSLv3 attack.<br />
<br />
If you want to check your SolusVM Slave Server then you need to enter your slave server IP Address and ssl port number. Eg:  <a href="https://12" target="_blank" rel="noopener" class="mycode_url">https://12</a>.3.4.5:port<br />
<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">How to Disable this in Lighttpd?</span></span><br />
You can follow our SolusVM SSLv3 Tutorial because of SolusVM use Lighttpd Webserver however I am writing this tutorial for you so you can easily understand this.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Enter this command in your SSH Client</span><br />
<blockquote class="mycode_quote"><cite>Quote:</cite>nano /etc/lighttpd/lighttpd.conf</blockquote>
<br />
In lighttpd.conf enter this command in your &#36;SERVER["socket"] == ":443" line but don't forget to enter this after <span style="font-weight: bold;" class="mycode_b">{ </span> bracket start and before <span style="font-weight: bold;" class="mycode_b">}</span> bracket close line.<br />
<br />
<br />
Here is example:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>&#36;SERVER["socket"] == ":443" {<br />
  ssl.engine = "enable"<br />
  ssl.pemfile = var.confdir + "/example.org.pem"<br />
  ssl.ca-file = var.confdir + "/example.org.bundle.crt"<br />
  server.name = var.confdir + "/example.org"<br />
  server.document-root = "/srv/html"<br />
  ssl.use-sslv2 = "disable"<br />
  ssl.use-sslv3 = "disable"</blockquote>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Save your file and then restart ligghtpd.</span><br />
<blockquote class="mycode_quote"><cite>Quote:</cite>service lighttpd restart</blockquote>
<br />
<br />
Note: "service ligghtpd restart" command works on CentOS but If you are using any other Operating system then you need to search in google on how to restart lighttpd on your xyz operating system]]></content:encoded>
		</item>
	</channel>
</rss>