Problems with remote db connection between 2 Hestia servers

Hi Dear Hestia devs & other readers,
been a long while I have had opportunity to visit here but now have recovered and doctor said can use my hands ( a little)

So I’ll describe the background and sorry I think this is not at all Hestia CP’s fault in any Way! It’s Robust Piece of Code, thank You Sirs, when I get my salary I’ll offer you a meal.

Server setup is basic: 1 purely dev& Database server and smaller one is web server. NS is handled with cloudflare on webserver and db server is connected through ipv4 (shame on me)

On last Friday I got an alarm that web server could not connect to external web server. I had not make any changes.

I noticed db servers bind was not working at all and also that all dormant user accounts were active. I did manage to took a backup but noticed right after that db size bumped up 35% (perhaps encrypted now?) also have had no luck/time yet to install sql backup anywhere to see how badly its hacked.
I think these sympoms might relate to (Ubuntu & Perl and rsync traversal ? ) So normal privileges might have gained root access?

I empahsize this is not related to Hestia CP but sort of the solution might be understand how to make steps to recover db and web server and make it safe without starting from scratch. Problem with db server is that great hosting provider (or attacker) made so that there were no automatic backups on hoster :frowning:
Also There was a bind installed and ha to install it again.

Downtime minimising is essential and If someone could help me get on the right track. So I did try to minimze damages spreading and used hestia cli command to suspend users, strange they have no domains and still following happens:

Configuration file ‘/etc/bind/named.conf.options’
==> Modified (by you or by a script) since installation.
==> Package distributor has shipped an updated version.
What would you like to do about it ? Your options are:
Y or I : install the package maintainer’s version
N or O : keep your currently-installed version
D : show the differences between the versions
Z : start a shell to examine the situation
The default action is to keep your current version.
*** named.conf.options (Y/I/N/O/D/Z) [default=N] ?
named-resolvconf.service is a disabled or a static unit not running, not starting it.
Failed to preset unit: File /etc/systemd/system/bind9.service already exists and is a symlink to /dev/null.
/usr/bin/deb-systemd-helper: error: systemctl preset failed on named.service: No such file or directory
Processing triggers for systemd (245.4-4ubuntu3.24) …
Processing triggers for man-db (2.9.1-1) …
Processing triggers for ureadahead (0.100.0-21) …
Processing triggers for libc-bin (2.31-0ubuntu9.16) …
root@scrooge:~# sudo egrep “^slime1:!” /etc/shadow > /dev/null; echo $?
1
root@scrooge:~# v-suspend-user slime1
Error: user slime1 doesn’t exist

But, it does Slime1 I mean and a dozen of other Slimes

Sorry but I am not an server admin (they still don’t believe it :slight_smile: and my bad hands and hosting companys reckless backup situation forces to use them too much all ready. I know clean install requires a load full of work and there are financial losses involved.

Anyway , have a very happy spring time. Try to rest too.
Brgds Viperzer0

Is the user a user created with in Hestia?

v-list-users should provide a list …

systemctl status bind9
systemctl start bind9

Should check the current status and atttempt to star it

1 Like

Hi,
I did investigate further and have a question regarding SA accounts. I think there at least previously were No SA account and now some files are ownde by SA and issuing those commands shows there is no star on any user accounts and bind9 fails to start. So regarding to my first post we might be in pickle here. Is it possible that there is a SA for hosting template etc?

Thanks for you trying to help, it will be compensated.
BR, Viperzer0

Hi Eris,
I think the server might be hacked or the problem lies with ssl certificate and cloudflare so Letsencrypt can not renew certificate but just before this happened there was a flood of binary code injection attempts, I trasnlated some as 7 byte binary and it was korean characters with a message but I suspect it was meant that way…will not open up things openly anymore because investigation is far from complete.