In Progress CPANEL-41951 - LiteSpeed segmented chroot()ed spam on server that don't have LiteSpeed

Dec 12, 2022
10
6
3
United States
cPanel Access Level
Root Administrator
The issue is about an error message that is not accurate which leads to wasted support hours troubleshooting a problem that does not exist, not to mention questioning confidence in the "system". The longer it takes to fix this errant notification does not help the situation.
 
  • Like
Reactions: aztopdavid

drhigh5

Registered
Feb 6, 2023
1
1
1
UK
cPanel Access Level
Root Administrator
We are also getting the annoying daily email saying:
LiteSpeed vhosts are not segmented or chroot()ed. Consider a more robust solution by using “CageFS on CloudLinux”.
All our user accounts have either jailed or disabled shells.
Do we expect the Security Centre to stop incorrectly identifying this as a security risk?
 
  • Like
Reactions: aztopdavid

cPRex

Jurassic Moderator
Staff member
Oct 19, 2014
15,235
2,423
363
cPanel Access Level
Root Administrator
When the case is resolved, the messages will stop being sent in error. I did reach out to our developers to let them know that many users are still seeing this warning, and while there has been some action on the case internally, I don't have much I can share at this point, other than it is being worked on.
 
  • Like
Reactions: drhigh5

yatesf

Member
Sep 28, 2013
11
2
53
cPanel Access Level
Root Administrator
Update - this is going to be resolved in 110. I haven't heard if this will make it into the 108 changes just yet.
Version 110? Holy cow, that seems pretty far out.

Is there a best recommendation of which notification(s) to turn off or reconfigure in the interim (as a workaround) to stop getting these "litespeed vhost" false alarms? I've been getting the warnings almost daily.
 

rivermobster

Well-Known Member
Dec 16, 2020
130
34
28
SoCal
cPanel Access Level
Root Administrator
The fake warning is gone now. But now, I'm getting this warning that I'm being told to ignore! lol

Apache vhosts are not segmented or chroot()ed. Enable “mod_ruid2” in the “EasyApache 4” area, enable “Jail Apache” in the “Tweak Settings” area, and change users to jailshell in the “Manage Shell Access” area. Consider a more robust solution by using “CageFS on CloudLinux”. Note that this may break the ability to access mailman via Apache.

What do to, what to do....

:-p
 

aztopdavid

Well-Known Member
Jan 1, 2016
60
16
58
Arizona
cPanel Access Level
Root Administrator
I have the same issues described in this thread on my VPS that's currently at 108.0.14. The bogus Security Advisor notifications are a nuisance and tt would be nice to have it resolved before 110.
 
  • Like
Reactions: cPRex