Maybe we should find an alternative panel for better security or wait a big update...

    Jimmy Why wait for update of a software that was not built with fundamental security?

      aaP-aris

      So, what free and open source panel you suggest as a alternative?

        Jimmy bots are very smart nowadays. They can bypass JS challenges. This says a lot. You should see my Cloudflare dashboard. One minute after I block some countries, the next minute I get requests from countries not seen before in the logs.

        Jimmy I will return on FASTPANEL which is a perfect free alternative, but lacks some GUI tools that aaPanel has (which is what caught my attention). You can use them via CLI though.

          aaP-aris

          Oh yes. I finally found one! I also use FastPanel, I agree that is a perfect alternanative with quick ticket support and more stability. Some specs lacks but is very good on speed, uses different accounts for sites, very low use of memory and mainly Apache + Nginx is perfect (backend go very fast). General FastPanel has logic but needs a better deploy, some parts are a litle mysterious.

          CQT Suggestion! Connect the sys firewall and geoip under one tab. Write Config in such a way that both get the DB from one source (folder) and can access it at the same time. Furthermore, the IP and the entire IP range are queried, which can then be blocked using a button, but which the user can decide for himself whether only the individual IP (Geoip is blocked or the entire network of the IP operator). Then integrate the NGINX firewall into the whole. Because on the one hand it is very confusing, and I also think that everything does not work together so harmoniously.

          Which is the full procedure to integrate them all?

          Thank you very much

          Make a unified response, our panel is open source, github address: https://github.com/aaPanel/BaoTa
          In addition I read most of the responses, is some targeted scanning, such as phpmyadmin use of port 888, redis use of port 6379, if you do not use phpmyadmin or redis, you can remove these ports in the panel security, if you use phpmyadmin, redis, I also do not recommend that you use the default If you use phpmyadmin and redis, I don't recommend you to use the default ports, you can modify them to other ports that are not used by other services. In addition, the service permissions on the panel are accessed by localhost|127.0.0.1 by default, except for the ports that are needed on the panel such as 8888 80 443.
          We attach great importance to user feedback on security-related issues, because we ourselves are a company that does security operations and maintenance, and if our products are questioned, all our employees will feel bad about it!
          Also if you encounter security related information during use, you can email our team directly to anyone! My email address is: power@aapanel.com

            Jimmy Maybe we should find an alternative panel for better security or wait a big update...

            Cyberpanel is much better. They hired Rack911 to help tighten the security. Keep in mind, they were not badly off in terms of security. https://rack911labs.ca/research/security-analysis-of-alternative-control-panels/

            aaPanel should follow suit.

            aapanel_power We attach great importance to user feedback on security-related issues, because we ourselves are a company that does security operations and maintenance, and if our products are questioned, all our employees will feel bad about it!

            You need an independent third-party company to conduct a security audit of aaPanel. There will always be smart asses out there and that's why an independent audit is important.

              I personally am sorry for speaking harshly, but I do that (I mean to say sorry) because I am human and also a developer and I know how hard it is to maintain something, especially opensource, but I am a perfectionist, and you should do to, because your software is serving a big share of people. Also, you have to understand that your words should follow your actions if you want them to have actual meaning. After a year of comments in this thread I did not see any actions in terms of this matter. There is a vulnerability here. Once your users install the panel using the bt.cn node, instantly their cover is blown and they are suddenly exposed to the world and easy exploitable with automated payloads, this is serious stuff. Thank you!

                aaP-aris Once your users install the panel using the bt.cn node, instantly their cover is blown and they are suddenly exposed to the world and easy exploitable with automated payloads, this is serious stuff. Thank you!

                Unfortunately, aaPanel is rebrand of BT Panel and I think aaPanel developers have to wait for BT Panel developers to do stuff. So in this case, they have to request BT Panel developers to work on it.

                Nope. You are 100% wrong here (my opinion). I don't agree with you for 2 reasons. First reason: it's open source, so they can do whatever they want and second reason: all they had to do is change the installation script and remove bt.cn nodes. The installation script is not even a part of the main repository, it's a separate file downloaded from their official rebranded website, not the bt.cn version!

                @aaP-aris and @Jimmy guys thanks a mil for the fastpanel hint. Haven't had much time to try it, but so far what I have tested I am really enjoying it!

                Pros:

                • Super fast performance;
                • Uses the systems packages instead of cumbersome install scripts that break everything;
                • Well achieved user interface, haven't found any bugs;

                Cons:

                • No chance of changing the default user or create a new "super user" and remove the current;
                • No ability to choose what software to install in the beginning;

                However, I have used dnf to remove ... exim, dovecot and a couple of other services it installs by default, it removes the services and appears to be working perfectly.
                Again, the performance of the panel itself is brilliant, I'm very much enjoying it. Cheers

                Also they have good support. It's free and they respond quickly. I've tried it!
                Another good alternative if you deploy websites via Vultr is Plesk (Web Admin SE). It's FREE for 3 domains and it has all the features of the paid version!

                a year later

                CQT You can't run a regex to get only the ip's so i lost 10 seconds to do that for you.

                106.13.82.54
                114.67.113.78
                49.235.141.203
                203.195.235.135
                107.170.104.125
                1.204.116.48
                159.65.158.30
                218.94.156.130
                205.185.123.139
                121.204.185.106
                37.49.224.65
                207.244.247.251
                51.75.171.171
                180.250.248.169
                205.185.115.40
                154.204.27.249
                84.124.204.154
                106.124.135.232
                49.234.122.94
                144.172.73.40
                222.186.15.158
                128.199.100.254
                207.244.247.192
                122.51.66.219
                114.67.102.106
                49.234.83.240
                223.167.13.128
                119.45.114.87
                120.201.125.204
                150.129.67.50
                144.172.79.8
                45.162.216.10
                106.75.13.192
                222.186.30.218
                222.186.52.39
                219.250.188.165
                168.197.31.14
                144.172.73.41
                118.89.69.159
                82.118.236.186
                112.35.57.139
                50.70.229.239
                85.209.0.103
                37.49.224.39
                218.92.0.216
                58.246.94.230
                144.172.79.7
                220.78.28.68
                124.30.44.214
                51.178.55.92
                222.186.30.167
                186.147.129.110
                117.50.8.61
                181.30.99.114
                222.186.31.166
                115.78.4.219
                218.255.86.106
                222.186.15.115
                222.186.42.137
                218.92.0.223
                216.83.45.162
                218.92.0.221
                111.229.176.206
                222.186.30.76
                218.92.0.219
                222.186.42.155
                222.186.30.112
                94.172.225.26
                218.92.0.215
                93.146.233.226
                193.70.12.219
                112.17.184.171
                222.186.31.83
                222.186.42.136
                218.92.0.220
                36.111.171.108
                119.18.194.168
                222.186.190.14
                222.186.42.7
                222.186.180.142
                109.115.187.31
                222.186.30.57
                106.124.141.108
                139.215.217.181
                61.177.172.102
                109.244.101.169
                182.252.133.70
                222.186.15.62
                144.172.79.5
                222.186.30.35
                222.186.31.127
                222.186.180.130
                186.215.235.9
                152.136.141.254
                14.142.143.138
                112.35.62.225
                111.229.78.120
                106.12.215.244
                23.129.64.0
                89.248.168.0
                89.248.168.255
                212.70.149.0
                212.70.149.255
                212.70.149.0
                212.70.149.255


                And i make enough time to upload a list with the ip's tested.

                https://we.tl/t-iTQ8A105T8

                How are this ip's from BT panel when are random countries? And mostly are clean ip's not even fucking VPN's.

                If someone would want to steal data will do it on long run and over vpn's you know is smarter that way.

                Jimmy That is mostly because IPv4 is reused big times, on OVH i had 600 ssh requests because the ip was reused so don't blame the tool, i'm not sure if this panel is safe but for sure on a production server i won't use any panel not even the paid one's, this one is good for fast dev deployment so is a usefull tool. Who use a panel for production and talk about security and employers that do that and that and they can't make a proper log common sense lol. Look at GoDaddy's cPanel hacking to understand how secure it was.

                With this one you have the source code atleast but i still not recommend to use any panel in a production server.

                Port scanning and brute force is also common, This is nothing related to panel. As this panel is having more than a million installation, definitely it will be a target for bad boys.
                Some prevention for production servers

                1. Go with SSH login and disable root once everything is done.
                2. Secure shared memory by adding tmpfs /run/shm tmpfs defaults,noexec,nosuid 0 0 in /etc/fstab
                3. Install fail2ban and activate server protection for sshd, ftp, mysql etc
                4. NGINX WAF for website.
                5. Add cloudflare if possible and block ip having threatscore above 14.
                6. Add captcha challenge for countries like china, and other if needed.
                7. Change ssh port to anything between 100 and 1024.
                8. Make Sure No Non-Root Accounts Have UID Set To 0
                9. Enable SSH Login for Specific Users Onl

                Anyone can add points to this as its good for everyone.

                deewinc And you think that audit make it more secure?
                GoDaddy's cPanel was hacked even if it is one of the oldest panel and with hundreds of hours of research, when someone want to hack you will not fail just because your panel have a security audit lol.

                Anything can be hacked once it has access to the internet.