Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Directadmin Feedback Thread! Feedback wanted to help improve the product! - Page 22
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Directadmin Feedback Thread! Feedback wanted to help improve the product!

1192022242551

Comments

  • MikePTMikePT Moderator, Patron Provider, Veteran

    @smtalk said:

    @Francisco said:
    @DA_Mark I'd really like a way to do an administrative suspend of an email address, or a whole accounts ability to send emails.

    In cPanel we have whampi1 suspend_outgoing_email user=$username which is helpful when you have a user that has a compromised mail box.

    Francisco

    https://help.directadmin.com/item.php?id=655

    If you want to block just a global system path (php mail()), you can just use /etc/exim.blockcracking/script.denied_paths.txt for it, for example:
    ^./wp-content/cache.
    ^./wp-content/uploads.

    To block an email account until he changes his password (button would appear in GUI):
    /var/spool/exim/blocked_authenticated_users

    To block just a single PHP path:
    /var/spool/exim/blocked_script_paths

    Nah. Just automate this. Providers cant spend time on CLI 😁.

    Oh, https://customerdomain:2222 pls....
    All our resellers have asked for this. It can just share their own SSL. Doesnt look hard to implement as the origin SSL already exists. Like cPanel does it.

    Thanked by 1AlwaysSkint
  • FranciscoFrancisco Top Host, Host Rep, Veteran

    All our resellers have asked for this. It can just share their own SSL. Doesnt look hard to implement as the origin SSL already exists. Like cPanel does it.

    https://directadmin.com/features.php?id=2461

    Who knows if it'll be in 1.582, but soon!

    Francisco

    Thanked by 2MikePT MichaelCee
  • MikePTMikePT Moderator, Patron Provider, Veteran

    @Francisco said:

    All our resellers have asked for this. It can just share their own SSL. Doesnt look hard to implement as the origin SSL already exists. Like cPanel does it.

    https://directadmin.com/features.php?id=2461

    Who knows if it'll be in 1.582, but soon!

    Francisco

    Yeah. I am aware of that but we need the automation! 🤘

  • The conversion from cpanel to directadmin was nightmare for me I gave up and went back to cpanel perhaps I will come back in a few months when the conversion software becomes smarter :)

  • @Oldmanasking If you ordered/paid for a license through us, let me know so I can at least give you a refund. Feel free to share your frustrations here as well, for example what things failed during migration. These are 2 different products with 2 different feature sets, so migration is not a perfect thing. But that's not saying there is room to improve.

    For a list of known issues, anyone can see:

    https://forum.directadmin.com/showthread.php?t=58059

    As for some of the comments above this.. yes, DA is a learning curve, and it's also a learning curve for us. Our traditional customer base is admins who aren't afraid to get their hands dirty at times, but now there is an expectation of no CLI work whatsoever.

    I think the best balance is to have the most common features through the GUI, and if you wan't something really obsecure, then you must be willing to run a bash script through the CLI at least.

    Now -- on the other hand. DA has an incredible amount of features but many of them are kind of hidden within the docs, and point to CLI stuff. This kind of defeats the purpose of a control panel, and is certainly a fair criticism of our product. So I completely appreciate someone like @MikePT saying "Nah, just automate this." That's exactly what we need to hear. If you are doing something often enough to become painful, then it is definitely a "Nah, just automate this" issue.

  • @MikePT said:
    Oh, https://customerdomain:2222 pls....
    All our resellers have asked for this. It can just share their own SSL. Doesnt look hard to implement as the origin SSL already exists. Like cPanel does it.

    Couldn't you just set up an Apache VirtualHost (it'd have to be on a different port than whatever port DirectAdmin is using) and use a ProxyPass or a mod_rewrite proxy to pass information on that VirtualHost on to the server's port 2222 (or whatever port DirectAdmin is running on).

    Actually... you could even do this on regular https port 443. Just something quickly off the top of my head:

    https://pastebin.com/pH6u8tMt

    You'd have to create an A record for directadmin-panel.customerdomain.com to resolve to the server. And you'd have to create a certificate to include directadmin-panel.customerdomain.com on it's CN or SAN.

    I don't actually know if this would work. But might provide some insight on how to do this without completely re-inventing the wheel.

    Thanked by 2DA_Mark MikePT
  • One of the issues I had when I first started using DirectAdmin (been using it for about a month now) is the option to add user packages, I had to change my skin to hybrid to be able to see it as its not listed under the standard skin... this can be very confusing.

  • @WebHostingUK said:
    One of the issues I had when I first started using DirectAdmin (been using it for about a month now) is the option to add user packages, I had to change my skin to hybrid to be able to see it as its not listed under the standard skin... this can be very confusing.

    It’s on reseller access level :smile: Hybrid just “merges” admin+reseller to one, that’s why it worked for you.

    Thanked by 1eva2000
  • It has been about ten years since I experienced DirectAdmin. I have not been back until this week.

    Lol, the only complaint I have is the ten character limit on package names. I fixed that, along with a few other things and it’s a pretty solid CP.

    What I am seeing with most people and their issues with DA is it’s not cPanel. It requires taking yourself out of the box you’ve been in for ten years and having to figure things out that you already knew in cPanel. The curve isn’t that bad.

    Clients are one thing, but if you don’t have people on your team that cannot master DirectAdmin within a week, you need new people on your team.

    Thanked by 2coolice ITLabs
  • @Oldmanasking said:
    The conversion from cpanel to directadmin was nightmare for me I gave up and went back to cpanel perhaps I will come back in a few months when the conversion software becomes smarter :)

    Just create the issues as a ticket, as we don't have any known ones at the moment. We'd be glad to assist you. Did you follow the official migration guide?

    Thank you!

  • @deadlyllama said:
    And the other DA pain point I've just discovered:
    The LetsEncrypt SSL certificate integration shows all hostnames the account could possibly have associated with it - (all prefixes, dot all domains)

    But you have to go through each domain associated with your account (using the domain selector in the top right hand corner of the UI) to generate a cert for that domain. If you generate one big cert for all the domains, with a whole heap of subject alternate names ... it only applies to the domain you had selected in the UI when you created it.

    So my account has one.com, two.com, three.com

    With domain selector (drop down, top right hand corner of DA UI) at one.com I go to create a letsencrypt cert

    I add all the names - ftp.one.com, www.one.com, ftp.two.com, www.two.com, ftp.three.com, www.three.com

    Cert creates successfully

    Then you go to https://www.one.com/ and it all works

    but https://www.two.com/ and https://www.three.com/ come back with the wrong certificate and my browser displays its lovely security warning error.

    Suggested behaviour: don't show hostnames in the letsencrypt cert creator, other than for the currently selected domain.

    Are you looking for https://www.directadmin.com/features.php?id=2093 ?

  • @DA_Mark said:
    @Oldmanasking If you ordered/paid for a license through us, let me know so I can at least give you a refund. Feel free to share your frustrations here as well, for example what things failed during migration. These are 2 different products with 2 different feature sets, so migration is not a perfect thing. But that's not saying there is room to improve.

    For a list of known issues, anyone can see:

    https://forum.directadmin.com/showthread.php?t=58059

    As for some of the comments above this.. yes, DA is a learning curve, and it's also a learning curve for us. Our traditional customer base is admins who aren't afraid to get their hands dirty at times, but now there is an expectation of no CLI work whatsoever.

    I think the best balance is to have the most common features through the GUI, and if you wan't something really obsecure, then you must be willing to run a bash script through the CLI at least.

    Now -- on the other hand. DA has an incredible amount of features but many of them are kind of hidden within the docs, and point to CLI stuff. This kind of defeats the purpose of a control panel, and is certainly a fair criticism of our product. So I completely appreciate someone like @MikePT saying "Nah, just automate this." That's exactly what we need to hear. If you are doing something often enough to become painful, then it is definitely a "Nah, just automate this" issue.

    one important thing you should add to let's encrypt is Dry Run, as for people with lack of knowlege sometimes try to issue ssl with dns record / before dns change over 5 times and get locked for a week

  • Well, regarding Let's Encrypt (and for that matter AutoSSL with cPanel)... why does this require end-user interaction?

    Why does there have to be a button in the end-user's panel to issue a Let's Encrypt or free certificate?

    People are either going to use a certificate for a domain or they are not. If they aren't going to use it... what does it cost to issue and install one anyway?

    Making this end-user interactive just serves to create confusion. "Why isn't it issuing a certificate?" ... because you haven't updated your nameservers or the domain is not otherwise resolving to the server. "Why am I getting a certificate warning for this addon domain?" ... probably because you didn't issue a certificate for that addon domain or you attached the wrong certificate to the addon domain. "Why isn't mail.mydomain.com working securely in my email client?" ... probably because you forgot - or didn't know - to add mail.mydomain.com to the SANs when issuing a certificate.

    Why not just go through all of the VirtualHosts setup on a server, see if that ServerName and all of it's ServerAlias's (this is why I hate the idea of domain aliases) resolve to the server, see if any of those domains need a secure certificate (again... why I hate domain aliases), and if those two questions are yes... then issue and install a certificate automatically. Stick it in a cron, run it hourly or whenever. No end-user interaction is required.

    Sure... clients will write in - "why hasn't a certificate been issued yet?" ... patience, grasshopper - if you've changed the nameservers and the domain is resolving to the server it will be issued in the next cron interval.

    The end-user having access to issue a certificate isn't going to make the domain name resolve to the server any faster.

    Thanked by 1kkrajk
  • DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

  • FranciscoFrancisco Top Host, Host Rep, Veteran

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    Ah my friend if you ever see the cpanel list you let me know.

    Rack911 makes a living out of it.

    Francisco

    Thanked by 2DA_Mark cybertech
  • @Francisco said:

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    Ah my friend if you ever see the cpanel list you let me know.

    Rack911 makes a living out of it.

    Francisco

    You say that you know of cPanels exploits, but you give it to customers??

  • @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    Hey the exploit is of 2015. Now we are nearing end of 2019.

    Exploits are common to almost all scripts and software.

    Starting from Microsoft, centos to Facebook every product / service had exploits and it was patched.

    History shows DA acknowledged and released patches in rapid manner, and that should be appreciated.

  • @vpsjungle said:

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    Hey the exploit is of 2015. Now we are nearing end of 2019.

    Exploits are common to almost all scripts and software.

    Starting from Microsoft, centos to Facebook every product / service had exploits and it was patched.

    History shows DA acknowledged and released patches in rapid manner, and that should be appreciated.

    Hmm. 2x4.ru have no exploit though...

  • @timothy_vyder said:

    @vpsjungle said:

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    Hey the exploit is of 2015. Now we are nearing end of 2019.

    Exploits are common to almost all scripts and software.

    Starting from Microsoft, centos to Facebook every product / service had exploits and it was patched.

    History shows DA acknowledged and released patches in rapid manner, and that should be appreciated.

    Hmm. 2x4.ru have no exploit though...

    Seems from morning you are commenting everywhere.

    Looks like spammer :(

  • @Francisco said:

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    Ah my friend if you ever see the cpanel list you let me know.

    Rack911 makes a living out of it.

    Francisco

    ^^ This. No way we claim perfection. Our last Rack911 audit was not fully clean either -- they discovered some race attacks in the low-moderate risk range (an attacker being able to harm themselves, but a low risk of harming others in a real-world environment). Of course, this was patched.

    In the last week, the folks at hekko.pl did an audit & were kind enough to share a vulnerability in the way DA calls some 3rd-party software. It's already been patched. They didn't even ask for a bug bounty. There is definitely some decency in this community.

    Finally, and I don't mean this as sounding cocky, but if your servers were truly exploited/rooted as a result of DA, contact us for a full refund. I'm betting there will be zero takers on this. We stand behind our product and I dare anyone to find a legitimate "all my DA servers have been rooted/hacked" claim.

    As for the most recent suggestions on this thread, please understand that even if I don't reply to them individually, they are getting lots of attention from us. The SSL thing is a valid point, but LetsEncrypt does enforce throttling so it could be harmful to throw everything at it. But I will say, default everything secure, including the hostname for DA login, is something set in stone. It will be done.

    @Francisco requesting webmail/phpmyadmin auto-login is set in stone also, and set for the next release. Webmail is already guaranteed, as a completed feature. See: https://www.directadmin.com/features.php?id=2470

  • @DA_Mark said:

    @Francisco said:

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    Ah my friend if you ever see the cpanel list you let me know.

    Rack911 makes a living out of it.

    Francisco

    ^^ This. No way we claim perfection. Our last Rack911 audit was not fully clean either -- they discovered some race attacks in the low-moderate risk range (an attacker being able to harm themselves, but a low risk of harming others in a real-world environment). Of course, this was patched.

    In the last week, the folks at hekko.pl did an audit & were kind enough to share a vulnerability in the way DA calls some 3rd-party software. It's already been patched. They didn't even ask for a bug bounty. There is definitely some decency in this community.

    Finally, and I don't mean this as sounding cocky, but if your servers were truly exploited/rooted as a result of DA, contact us for a full refund. I'm betting there will be zero takers on this. We stand behind our product and I dare anyone to find a legitimate "all my DA servers have been rooted/hacked" claim.

    As for the most recent suggestions on this thread, please understand that even if I don't reply to them individually, they are getting lots of attention from us. The SSL thing is a valid point, but LetsEncrypt does enforce throttling so it could be harmful to throw everything at it. But I will say, default everything secure, including the hostname for DA login, is something set in stone. It will be done.

    @Francisco requesting webmail/phpmyadmin auto-login is set in stone also, and set for the next release. Webmail is already guaranteed, as a completed feature. See: https://www.directadmin.com/features.php?id=2470

    What you think audit show, Russia FSB have 10 more exploit more potent.

  • @vpsjungle said:

    @timothy_vyder said:

    @vpsjungle said:

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    @timothy_vyder said:
    DirectAdmin code is shit. Nobody remember?

    https://www.exploit-db.com/exploits/38110

    Hey the exploit is of 2015. Now we are nearing end of 2019.

    Exploits are common to almost all scripts and software.

    Starting from Microsoft, centos to Facebook every product / service had exploits and it was patched.

    History shows DA acknowledged and released patches in rapid manner, and that should be appreciated.

    Hmm. 2x4.ru have no exploit though...

    Seems from morning you are commenting everywhere.

    Looks like spammer :(

    You are angry that you are winter host.

  • FranciscoFrancisco Top Host, Host Rep, Veteran

    Me love you long time.

    Francisco

    Thanked by 3coolice ITLabs seriesn
  • @Francisco said:
    Me love you long time.

    Francisco

    Me so horny

  • @timothy_vyder said:

    @Francisco said:
    Me love you long time.

    Francisco

    Me so horny

    I love how this Friday night is going. Early Saturday morning for you, @timothy_vyder ? At least we are spending it together. :smile:

    Thanked by 2Nick_A ITLabs
  • @DA_Mark said:

    @timothy_vyder said:

    @Francisco said:
    Me love you long time.

    Francisco

    Me so horny

    I love how this Friday night is going. Early Saturday morning for you, @timothy_vyder ? At least we are spending it together. :smile:

    Yes. Would you like to sex?

  • @timothy_vyder said:

    @DA_Mark said:

    @timothy_vyder said:

    @Francisco said:
    Me love you long time.

    Francisco

    Me so horny

    I love how this Friday night is going. Early Saturday morning for you, @timothy_vyder ? At least we are spending it together. :smile:

    Yes. Would you like to sex?

    No.. I have too many vulnerabilities... :wink:

    Thanked by 1coolice
  • @DA_Mark said:

    @timothy_vyder said:

    @DA_Mark said:

    @timothy_vyder said:

    @Francisco said:
    Me love you long time.

    Francisco

    Me so horny

    I love how this Friday night is going. Early Saturday morning for you, @timothy_vyder ? At least we are spending it together. :smile:

    Yes. Would you like to sex?

    No.. I have too many vulnerabilities... :wink:

    That is true. With all the security vulnerability, I can catch a virus.

    Thanked by 1DA_Mark
  • jarjar Patron Provider, Top Host, Veteran
    edited August 2019

    In the last two hours I just stopped thinking about it and finally sat down to build a DirectAdmin version of MXroute. Heavily custom with help from your awesome support, update safe, ready to go.

    I have one piece of feedback @DA_Mark and it’s pretty minimal. If you go to DNS Management in the new evolution theme and copy the DKIM public key (after enabling DKIM), it looks like you’ve copied the right thing to paste into an external DNS system. In fact pasting it into notepad++ it looks uniform. But in actuality, somehow what you’re copying has a bunch of spaces in it that are strangely invisible until you query that external DNS service you pasted it in. This is the end result:

    x._domainkey.jar.land. 3600 IN TXT "v=DKIM1; \226\128\139k=rsa; p=M\226\128\139IIBIjANBgk\226\128\139qhkiG9w0BA\226\128\139QEFAAOCAQ8\226\128\139AMIIBCgKCA\226\128\139QEAvJjFgF5\226\128\139cWQ1gI1Xbi\226\128\139sOOzag0TRT\226\128\139/8grmHSYRx\226\128\139ITxHDB/X7F\226\128\139JHKM+Sex5E\226\128\139tlvOJI71FG\226\128\139JEsC80dahI\226\128\139uCq+P+1z/A\226\128\139FwpMhop2NB\226\128\13967HkXNhZ6l\226\128\139N4oM5tcl3v\226\128\139kwQbZlsQZn\226\128\1392/9IDVIas" "t\226\128\1393pWY3ymPLi\226\128\139D1w4EGmIZc\226\128\139zilsHTBwNZ\226\128\139F1w8q0cXhx\226\128\139Y+dS6BTHxr\226\128\139hzY5AAiO92\226\128\139gKfL1n+3Gt\226\128\139Sv20TeVmZC\226\128\1393jcj8i8u0D\226\128\139mKxGUaBxMf\226\128\139h6FdaG0kPJ\226\128\139jQNA6Ii2rc\226\128\139xrDKXg2UPO\226\128\139Pu8YtvFw7R\226\128\139BYLcKgZz5/\226\128\1399yeD8d8Umi\226\128\139F/iXITraWD\226\128\1397f3u/xNh5D\226\128\139iDoC+EffvM\226\128\139tJ7y" "+Hkh5o\226\128\139w3nzwIDAQA\226\128\139B"

    So I have to click Edit on the DNS record and copy it from the Value field, then it pastes correctly elsewhere.

    Oddly the only other place I could visibly see all of the spaces that I had copied, was when pasting and viewing in the desktop (not even mobile) client for telegram. Strange little obscure oddity, but it’ll throw my customers for a loop after ignoring me when I tell them to click Edit before copying ;)

    Thank you for taking on the weight of the industry at a moment’s notice!

    Edit: Here's what it looked like pasted into telegram, where it parsed the spaces that no other application seemed to: https://d.pr/i/RJrOq7

    Thanked by 2MichaelCee eva2000
  • If I am editing a file at File Manager, and then click on Back button, it takes me back to the main dashboard, and not to the same file manager screen. I have to navigate to the File Manager and various folders to reach the same place again.

Sign In or Register to comment.