It looks like a lot of the recent exploits require access to your SolusVM Master either as a client or as a guest. So here's a quick and easy way to prevent access:
iptables -A INPUT -j ACCEPT -p tcp -s <WHMCS_IP> --destination-port 5353 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <WHMCS_IP> --destination-port 5656 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <ADMIN1_IP> --destination-port 5353 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <ADMIN1_IP> --destination-port 5656 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <ADMIN2_IP> --destination-port 5353 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <ADMIN2_IP> --destination-port 5656 -i venet0
iptables -A INPUT -j DROP -p tcp --destination-port 5353 -i venet0
iptables -A INPUT -j DROP -p tcp --destination-port 5656 -i venet0Please note that I run my SolusVM Master on an OpenVZ VPS so your interface may be different.
This will allow your WHMCS installation and admins to access SolusVM but will block direct access. Automation will continue to work and clients can manage their VPSs via the SolusVM plugin, I know it's limited but it's better than nothing.
I had a lot more information typed up but IP.Board erased it all so if you have any questions feel free to ask.
iptables -A INPUT -j ACCEPT -p tcp -s <WHMCS_IP> --destination-port 5353 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <WHMCS_IP> --destination-port 5656 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <ADMIN1_IP> --destination-port 5353 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <ADMIN1_IP> --destination-port 5656 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <ADMIN2_IP> --destination-port 5353 -i venet0
iptables -A INPUT -j ACCEPT -p tcp -s <ADMIN2_IP> --destination-port 5656 -i venet0
iptables -A INPUT -j DROP -p tcp --destination-port 5353 -i venet0
iptables -A INPUT -j DROP -p tcp --destination-port 5656 -i venet0Please note that I run my SolusVM Master on an OpenVZ VPS so your interface may be different.
This will allow your WHMCS installation and admins to access SolusVM but will block direct access. Automation will continue to work and clients can manage their VPSs via the SolusVM plugin, I know it's limited but it's better than nothing.
I had a lot more information typed up but IP.Board erased it all so if you have any questions feel free to ask.
Last edited by a moderator: