<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Control WebPanel Wiki &#187; CWPsecure kernel</title>
	<atom:link href="http://wiki.centos-webpanel.com/tag/cwpsecure-kernel/feed" rel="self" type="application/rss+xml" />
	<link>http://wiki.centos-webpanel.com</link>
	<description>CentOS WebPanel Wiki</description>
	<lastBuildDate>Wed, 12 Feb 2025 20:38:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>CWP Secure CentOS Kernel</title>
		<link>http://wiki.centos-webpanel.com/cwp-secure-centos-kernel</link>
		<comments>http://wiki.centos-webpanel.com/cwp-secure-centos-kernel#comments</comments>
		<pubDate>Wed, 21 Jun 2017 19:46:01 +0000</pubDate>
		<dc:creator><![CDATA[publisher]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[CWPsecure kernel]]></category>

		<guid isPermaLink="false">http://wiki.centos-webpanel.com/?p=769</guid>
		<description><![CDATA[CWP Secure Kernel checking each action and request: Video instructions CWPsecure kernel when in use provides the highest security possible on the market for the shared hosting, no other control panel has something similar integrated to compare with. We can only compare it with Cloudlinux/CageFS. CWP custom kernel with security level similar to SeLinux. Since [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://wiki.centos-webpanel.com/cwp-secure-centos-kernel"><img class="alignnone size-large wp-image-1474" src="/wp-content/uploads/2020/10/ban1_665px.png" alt="CWP Secure CentOS Kernel" width="665" /></a></p>
<div class="st-alert st-alert- "><em>CWPpro license without support doesn't include CWPsecure Kernel.</em></div>
<p><strong>CWP Secure Kernel checking each action and request:</strong></p>
<p><a href="http://wiki.centos-webpanel.com/wp-content/uploads/2020/09/1920px-LAMP_software_bundle.svg_.png"><img class="alignnone size-large wp-image-1474" src="http://wiki.centos-webpanel.com/wp-content/uploads/2020/09/1920px-LAMP_software_bundle.svg_-1024x576.png" alt="1920px-LAMP_software_bundle.svg" width="665" /></a></p>
<p><strong>Video instructions</strong></p>
<p><object width="700" height="425"><param name="movie" value="https://www.youtube.com/v/VhX7nv44etM?version=3&amp;showinfo=0&amp;theme=light&amp;fs=1&amp;rel=0&amp;iv_load_policy=3&amp;modestbranding=1"></param><param name="allowScriptAccess" value="always"></param><param name="allowFullScreen" value="true"></param><embed src="https://www.youtube.com/v/VhX7nv44etM?version=3&amp;showinfo=0&amp;theme=light&amp;fs=1&amp;rel=0&amp;iv_load_policy=3&amp;modestbranding=1" type="application/x-shockwave-flash" allowScriptAccess="always" allowfullscreen="true" width="700" height="425"></embed></object></p>
<p><object width="700" height="425"><param name="movie" value="https://www.youtube.com/v/pMbsOv-IrZc?version=3&amp;showinfo=0&amp;theme=light&amp;fs=1&amp;rel=0&amp;iv_load_policy=3&amp;modestbranding=1"></param><param name="allowScriptAccess" value="always"></param><param name="allowFullScreen" value="true"></param><embed src="https://www.youtube.com/v/pMbsOv-IrZc?version=3&amp;showinfo=0&amp;theme=light&amp;fs=1&amp;rel=0&amp;iv_load_policy=3&amp;modestbranding=1" type="application/x-shockwave-flash" allowScriptAccess="always" allowfullscreen="true" width="700" height="425"></embed></object></p>
<p>CWPsecure kernel when in use provides the highest security possible on the market for the shared hosting, no other control panel has something similar integrated to compare with. We can only compare it with Cloudlinux/CageFS.</p>
<p>CWP custom kernel with security level similar to <a href="https://en.wikipedia.org/wiki/Security-Enhanced_Linux" title="SeLinux" target="_blank">SeLinux</a>.</p>
<p>Since this protection is <a href="https://en.wikipedia.org/wiki/Mandatory_access_control" title="Mandatory_access_control" target="_blank">MAC</a> at the kernel level meaning all not allowed by the policy by default is denied and that provides the highest security for your system.</p>
<blockquote>
<h2>Demo CWP Secure Kernel SSH account</h2>
<p><strong>SSH Server:</strong> 142.4.197.233<br />
<strong>Username:</strong> cwpuser<br />
<strong>Password:</strong> neQumXagNUTj<br />
<strong>SSH Port:</strong> 19443<br />
<strong>Example ssh login:</strong> ssh cwpuser@142.4.197.233 -p 19443<br />
<em>* You can test here all example commands, the demo account is reset every 1h.</em></p></blockquote>
<p><strong>Not supported systems:</strong> openVZ, cloudlinux, Virtuozzo, Lxc, Docker container<br />
<strong>Requirement:</strong> Having the ability to run &#038; install default centos kernel.<br />
<strong>Supported OS el7:</strong> CentOS 7<br />
<strong>Supported OS el8:</strong> CentOS Stream, CWP CentOS Delayed, Rocky Linux, Alma Linux, Oracle Linux</p>
<p><strong>How does it work?</strong><br />
We need to define into policy each binary file that can be executed and specify the allow list of rules for it.<br />
We can allow per application, user, program, service access to specif file, socket, port, IP ...<br />
We can allow for example that the test.php file of the user "john" located at /home/john/public_html/test.php can be executed only by john user and only by php-cgi version 5.4 which needs to be run by the john user.</p>
<p><strong>File Based restrictions</strong> (please note all not allowed, by default is denied)<br />
file read<br />
file write<br />
file execute<br />
file append<br />
file truncate<br />
file rename<br />
file getattr<br />
file create<br />
file unlink<br />
file symlink<br />
file link<br />
file chown<br />
file chgrp<br />
file chmod<br />
file chroot<br />
file mkdir<br />
file rmdir<br />
file mkfifo<br />
file mksock<br />
file mkblock<br />
file mkchar<br />
file ioctl<br />
file mount<br />
file unmount<br />
file pivot_root<br />
misc env</p>
<p><strong>Network limits</strong><br />
These rules allow us to perform network socket operations.<br />
network inet</p>
<p><strong>Network limits</strong><br />
These rules allow us to perform Unix socket operations.<br />
network unix</p>
<p>This protection can limit connection on the IP and/or port,<br />
deny read/write/execute.... access to the files if the owner is not matched...</p>
<p>At the moment we have defined more than several thousand rules which work with cwp only.<br />
A list of possible limits is huge so we can't add all info here.</p>
<p><strong>INSTALLATION</strong></p>
<blockquote><p>Since this requires maintenance at the moment it's available only for our clients having an active support service: <strong>Managed</strong>, <strong>Business</strong> or <strong>Enterprise</strong>.</p>
<p>Clients having CWP with an active support service can request from the support team to get the CWP kernel deployed.</p>
<p>If you don't have a support service you can get it <a href="https://control-webpanel.com/support-services" title="Get CWP Secure CentOS Kernel" target="_blank"><strong>here</strong></a>.</p></blockquote>
<p><strong>Currently, the CWP kernel is protecting:</strong><br />
- cwp user panel<br />
- apache webserver<br />
- varnish web cache server<br />
- nginx webserver<br />
- user crons and all applications running as cron<br />
- user ssh access<br />
- all PHP versions available in CWP: switcher, selector, and PHP-FPM selector<br />
...we are continuously developing additional rules to expand protection on many other services</p>
<p><strong>Example issues which kernel is protecting you from:</strong><br />
- symlink attacks (most commonly used to hack all users on the server)<br />
- execution of malware or custom scripts<br />
- access to server system files (/etc,/var, /usr, /home, and all others)<br />
- access to /tmp and /var/tmp files<br />
- access to /dev/shm memory partition<br />
- custom script connecting to other servers/ports<br />
- malware cron running bad things<br />
- hacked user ssh access to be used for running hacker scripts<br />
- hacked user ssh access to be used for accessing the system files<br />
- the limited set of secure tested ssh commands are only available to users<br />
...and many others.</p>
<p>It's very important to run cwp secure kernel on Webhosting servers to protect your system from hackers and also to prevent hacker and malware to expand from one hacked website to multiple sites and users or even the full server.</p>
<p>NOTE: If you run some custom programs, binary files, or others you will need to make custom rules if running CWP Secure Kernel.</p>
<p>We are continuously maintaining the kernel and the configuration to keep your servers at the highest level of security.</p>
<div class="st-alert st-alert- ">Don't leave your server system unprotected, get CWPsecure kernel, and rest assured.</div>
]]></content:encoded>
			<wfw:commentRss>http://wiki.centos-webpanel.com/cwp-secure-centos-kernel/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
