The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

cPanel Security Advisor query

Discussion in 'Security' started by xperience2, Nov 8, 2013.

  1. xperience2

    xperience2 Active Member

    Joined:
    Nov 24, 2003
    Messages:
    41
    Likes Received:
    0
    Trophy Points:
    6
    Nearly all of my servers are coming up with:

    ... but when I go to that option I get:

    So is that something I should do or not?!

    Cheers!

    Simon
     
  2. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    30,854
    Likes Received:
    676
    Trophy Points:
    113
    cPanel Access Level:
    Root Administrator
    Hello :)

    Please see the description for this option:

    If mod_ruid2 is compiled in via EasyApache, mod_ruid2 is enabled, and a user has their shell set to jailshell or noshell, enabling this option will chroot() a user's Apache Virtual Host into the cPanel® jailshell environment. Each user will require 14 bind mounts. While modern Linux supports a very large number of bind mounts, many processes read /proc/mounts (even mkdir on RHEL 5 and CentOS 5). Reading /proc/mounts can be quite expensive when it becomes large. It is highly recommended that you do not exceed 256 jailed users unless you are using RHEL 6 or CentOS 6.

    I recommend verifying the OS version and the number of users on your system before enabling this option.

    Thank you.
     
Loading...

Share This Page