25% off on first invoice for all services*

SPRING SALE

Use coupon

*Offer valid for new customers only

25% off on first invoice for all services*

SPRING SALE

Use coupon

*Offer valid for new customers only

Need help?

Our experts have had an average response time of 11.43 minutes in March 2024 to fix urgent issues.

We will keep your servers stable, secure, and fast at all times for one fixed price.

Plesk brute force protection – How we set up and fix errors

by | Sep 10, 2019

Brute force attacks are literally annoying and make the entire website down.

But, can we do anything to avoid this attack?

Yes. Popular control panels like Plesk offer Fail2ban aka IP Address Banning that protects websites from brute-force attacks.

However, problems like deprecated directives in the .htaccess file prevent the proper working of Fail2ban.

At Bobcares, we often get requests from our customers to configure Plesk brute force protection as part of our Server Management Services.

Today, we’ll see the reasons and how our Support Engineers configure brute force protection on Plesk and fix related errors.

 

How we set up Plesk to automatically ban IP addresses

IP address banning is an effective utility against brute-force attacks on a Plesk Linux server. It allows managing IP address banning on the server. Also, it monitors malicious signs like too many password failures, exploits, etc.

In order to perform IP address banning, we should install the Fail2Ban component on the server.

We use the following command to perform the IP banning manually,

For example,

plesk bin ip_ban --update -ban_period 120 -ban_time_window 120 -max_retries 3

Also, we set up Plesk to automatically ban IP addresses as follows.

1. Initially, we go to Tools & Settings > IP Address Banning.

2. Then, we activate the Fail2Ban service by selecting the checkbox for Enable intrusion detection.

And, we fill the following settings:

  1. IP address ban period
  2. The time interval for the detection of subsequent attacks
  3. The number of failures before the IP address is banned

3. Finally, we click OK.

 

How we fix the errors related to brute force protection on Plesk

At Bobcares, where we have more than a decade of expertise in managing servers, we see many customers face problems while configuring brute force protection on Plesk.

Now let’s see how our Support Engineers fixed the top errors.

 

1. Deprecated detectives in the .htaccess file

Recently, one of our customers had a problem after setting up Fail2Ban on the server. Fail2Ban blocked visitors’ IP addresses after opening a website. And got an error ERR_CONNECTION_TIMED_OUT.

By investigating, we found the following error in the /var/log/fail2ban.log file.

fail2ban.actions [1343]: NOTICE [plesk-apache] Ban 181.xx.yy.2

This error happened due to the presence of deprecated detectives in the .htaccess file. Therefore, we searched for each .htaccess file inside the domain home folder and checked the deny directives in the .htaccess file.

To fix the error, we changed the code from

Order allow,deny
Allow from all

To

Require all granted

This fixed the problem and IP banning started working fine.

 

2. Too many login attempts

Sometimes, a valid user IP can be blocked on the server when trying different passwords. This particularly happens in situations where the user can’t remember passwords.

Here, the user may get a Connection timed out message for mail, web, SSH, etc.

The error will look like:

ssh: connect to host server.hostname.com port 2022: Connection refused

Then, we check whether the IP address is blocked or not by using the following command.

iptables -n -L

Next, if it is listed we unban the IP address.

Moreover, we suggest customers enter the correct login details.

 

[Getting error after enabling brute force protection? We’ll fix it for you.] 

 

Conclusion

In short, in order to strengthen the server security, we enable Plesk brute force protection on servers to prevent attacks. We also discussed the ways in which our Support Engineers fix related errors.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

var google_conversion_label = "owonCMyG5nEQ0aD71QM";

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Categories

Tags

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF