

Any determined user can simply upload a script to their website that makes a system call using one of the aforementioned interpreters’ built-in functions, and they can essentially run any command they want. While restricted shells such as cPanel’s jailshell may help limit a user’s exposure to the world outside their home folder, there is little the user can see or do via an SSH-obtained shell that they can’t via, say, a PHP or Perl script. As a hosting provider you should aim to find the proper balance between usability and security – in other words, not making things so secure that they are not usable by reasonable means, nor so accessible that basic security concepts go out the window.Ĭannot See My Website Online After Upload, Why? Limiting User Access Scope We should mention that there are hundreds of posts out there that discuss SSH from a security perspective, but many are irrelevant to shared or user-leased platforms due to the fact that they are either difficult to manage or make the use of SSH incredibly complicated for end users. These concerns, while valid, can easily be addressed.
SSH SHELL ACCESS ENABLED ON YOUR ACCOUNT CPANEL HOW TO
How To Create, Edit, and Delete a File in CPanel Using File Manager

Our answer is, no! If configured properly, there is really no compelling argument that allowing SSH access has any significant negative effect on the security or stability of your server. Some of the largest providers, however, are now offering SSH to make their services more functional for advanced users, so now we are often asked whether allowing SSH as a feature is a bad idea. Web hosts often shy away from the idea of allowing SSH access to their clients on shared servers, typically due to security concerns bred by the hosting industry.
