{"id":464,"date":"2012-11-06T14:16:38","date_gmt":"2012-11-06T19:16:38","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/support\/2012\/11\/06\/protect-against-ssl-tls-cbc-vulnerability\/"},"modified":"2021-08-16T23:29:38","modified_gmt":"2021-08-17T03:29:38","slug":"protect-against-ssl-tls-cbc-vulnerability","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/","title":{"rendered":"Protect against SSL\/TLS CBC vulnerability"},"content":{"rendered":"<div class=\"alert alert-danger\" role=\"alert\"><strong>**Notice:<\/strong> This article is for an older version of cPanel and is not up-to-date! We do not recommend following this guide since InMotion servers have already addressed this vulnerability.<\/div>\n<p>In this article we&#8217;ll discuss a server side fix for the SSL 3.0 (Secure Socket Layer) and TLS 1.0 (Transport Layer Security) vulnerability&nbsp;in handling ciphers that use CBC (Cipher-Block-Chaining). If you read our previous article on <a href=\"\/support\/security\/how-to-pass-pci-scans\/\">how to pass PCI compliance scans<\/a>, this is one of the tests that a PCI vendor might fail your website on when they scan it.<\/p>\n<p>As of April, 2012, PCI scanning vendors started identifying web servers running SSL 3.0 and TLS 1.0 as vulnerable even when not running Java. There was only one known exploit released called BEAST (Browser Exploit Against SSL\/TLS) which was a web-browser only attack. However some PCI vendors will still fail your server as a security precaution, if this is the case you can use the steps below to update your service&#8217;s cipher to a stream cipher such as RC4, rather than a block cipher.<\/p>\n<p>The steps mentioned below would first require you having <a href=\"\/support\/server\/ssh\/root-access-faq\/\">root access<\/a> to your server, and then you&#8217;d want to <a href=\"\/support\/server\/ssh\/how-to-login-ssh\/\">login to your server via SSH<\/a> to follow along.<\/p>\n<ol class=\"article_list\">\n<li>You will need to modify 7 service configuration files, the first thing you&#8217;d want to run is the following command to make a copy of all of these files with a <strong>.backup <\/strong>extension:\n<pre class=\"code_block\">for configFile in \/var\/cpanel\/conf\/pureftpd\/main \/var\/cpanel\/templates\/apache2\/main.local \/var\/cpanel\/cpanel.config \/usr\/local\/cpanel\/etc\/stunnel\/default\/stunnel.conf \/etc\/exim.conf.local \/usr\/lib\/courier-imap\/etc\/imapd-ssl \/usr\/lib\/courier-imap\/etc\/pop3d-ssl; do cp -frp $configFile{,.backup}; done<\/pre>\n<\/li>\n<li>For <strong>Pure-FTP<\/strong>, edit the file <strong>\/var\/cpanel\/conf\/pureftpd\/main<\/strong>Replace the line:\n<pre class=\"code_block\">TLSCipherSuite: ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM:!SSLv2<\/pre>\n<p>With the following text:<\/p>\n<pre class=\"code_block\">TLSCipherSuite: \"!aNULL:!eNULL:!EXPORT:!DSS:!DES:RC4-SHA:RC4-MD5\"<\/pre>\n<p>Run the following command to make the change active, and restart Pure-FTP<\/p>\n<pre class=\"code_block\">\/usr\/local\/cpanel\/whostmgr\/bin\/whostmgr2 doftpconfiguration &amp;&amp; service pure-ftpd restart<\/pre>\n<p>You can test it now with the following command:<\/p>\n<pre class=\"code_block\">openssl s_client -connect localhost:21 -starttls ftp<\/pre>\n<\/li>\n<li>For <strong>Apache<\/strong>, edit the file <strong>\/var\/cpanel\/templates\/apache2\/main.local<\/strong>Replace the lines:\n<pre class=\"code_block\">[% IF supported.mod_ssl -%]\n# SSLCipherSuite can be set in WHM under 'Apache Global Configuration'\n[% IF main.sslciphersuite.item.sslciphersuite.length %]SSLCipherSuite [% main.sslciphersuite.item.sslciphersuite %][% END %]\nSSLProtocol -ALL +SSLv3 +TLSv1<\/pre>\n<p>With the following text:<\/p>\n<pre class=\"code_block\">[% IF supported.mod_ssl -%]\nSSLProtocol -ALL -SSLv2 +SSLv3 +TLSv1\nSSLHonorCipherOrder on\nSSLCipherSuite !aNULL:!eNULL:!EXPORT:!DSS:!DES:RC4-SHA:RC4-MD5<\/pre>\n<p>Run the following command to make the change active, and restart Apache<\/p>\n<pre class=\"code_block\">\/scripts\/rebuildhttpdconf &amp;&amp; service httpd stop &amp;&amp; service httpd start<\/pre>\n<p>You can test it now with the following commands:<\/p>\n<pre class=\"code_block\">openssl s_client -connect example.com:443 -ssl3\nopenssl s_client -connect example.com:443 -tls1<\/pre>\n<\/li>\n<li>For <strong>cPanel<\/strong>, edit the file <strong>\/var\/cpanel\/cpanel.config<\/strong>Replace the line:\n<pre class=\"code_block\">nativessl=1<\/pre>\n<p>With the following text:<\/p>\n<pre class=\"code_block\">nativessl=0<\/pre>\n<p>For <strong>stunnel<\/strong>, edit the file <strong>\/usr\/local\/cpanel\/etc\/stunnel\/default\/stunnel.conf<\/strong><\/p>\n<p>Replace the line:<\/p>\n<pre class=\"code_block\"># Authentication stuff<\/pre>\n<p>With the following text:<\/p>\n<pre class=\"code_block\"># Authentication stuff\noptions = NO_SSLv2\nciphers = !aNULL:!eNULL:!EXPORT:!DSS:!DES:RC4-SHA:RC4-MD5<\/pre>\n<p>Run the following command to make the changes active, and restart cPanel<\/p>\n<pre class=\"code_block\">service cpanel restart<\/pre>\n<p>You can test it now with the following commands:<\/p>\n<pre class=\"code_block\">openssl s_client -connect localhost:2083 -ssl3\nopenssl s_client -connect localhost:2083 -tls1\nopenssl s_client -connect localhost:2087 -ssl3\nopenssl s_client -connect localhost:2087 -tls1<\/pre>\n<\/li>\n<li>For <strong>Exim (SMTP)<\/strong>, edit the file <strong>\/etc\/exim.conf.local<\/strong>Replace the line:\n<pre class=\"code_block\">tls_require_ciphers = ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM:!SSLv2<\/pre>\n<p>With the following text:<\/p>\n<pre class=\"code_block\">tls_require_ciphers = -ALL:!SSLv2:!aNULL:!eNULL:!EXPORT:!DSS:!DES:RC4-SHA:RC4-MD55<\/pre>\n<p>Run the following command to make the changes active, and restart Exim<\/p>\n<pre class=\"code_block\">\/scripts\/buildeximconf &amp;&amp; service exim restart<\/pre>\n<p>You can test it now with the following commands:<\/p>\n<pre class=\"code_block\">openssl s_client -connect localhost:465 -tls1\nopenssl s_client -connect localhost:465 -ssl3<\/pre>\n<\/li>\n<li>For <strong>Courier (IMAP)<\/strong>, edit the file <strong>\/usr\/lib\/courier-imap\/etc\/imapd-ssl<\/strong>Replace the line:\n<pre class=\"code_block\">TLS_CIPHER_LIST=ALL:!SSLv2:!ADH:!NULL:!EXPORT:!DES:!LOW:@STRENGTH<\/pre>\n<p>With the following text:<\/p>\n<pre class=\"code_block\">TLS_CIPHER_LIST=-ALL:!SSLv2:!ADH:!aNULL:!eNULL:!EXPORT:!DSS:!DES:RC4-SHA:RC4-MD5<\/pre>\n<p>For <strong>Courier (POP3)<\/strong>, edit the file <strong>\/usr\/lib\/courier-imap\/etc\/pop3d-ssl<\/strong><\/p>\n<p>Replace the line:<\/p>\n<pre class=\"code_block\">TLS_CIPHER_LIST=ALL:!SSLv2:!ADH:!NULL:!EXPORT:!DES:!LOW:@STRENGTH<\/pre>\n<p>With the following text:<\/p>\n<pre class=\"code_block\">TLS_CIPHER_LIST=-ALL:!SSLv2:!ADH:!aNULL:!eNULL:!EXPORT:!DSS:!DES:RC4-SHA:RC4-MD5<\/pre>\n<p>Run the following command to make the changes active, and restart Courier<\/p>\n<pre class=\"code_block\">service courier-authlib restart &amp;&amp; service courier-imap stop &amp;&amp; service courier-imap start<\/pre>\n<p>You can test it now with the following commands:<\/p>\n<pre class=\"code_block\">openssl s_client -connect localhost:993 -ssl3\nopenssl s_client -connect localhost:993 -tls1\nopenssl s_client -connect localhost:995 -ssl3\nopenssl s_client -connect localhost:995 -tls1<\/pre>\n<\/li>\n<\/ol>\n<p>You should now know how to update all of your service&#8217;s ciphers to help protect against this possible vulnerability that could cause a PCI scan to fail.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>**Notice: This article is for an older version of cPanel and is not up-to-date! We do not recommend following this guide since InMotion servers have already addressed this vulnerability. In this article we&#8217;ll discuss a server side fix for the SSL 3.0 (Secure Socket Layer) and TLS 1.0 (Transport Layer Security) vulnerability&nbsp;in handling ciphers that<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/\"> Read More ><\/a><\/p>\n","protected":false},"author":57014,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4312],"tags":[],"class_list":["post-464","post","type-post","status-publish","format-standard","hentry","category-ssl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect against SSL\/TLS CBC vulnerability | InMotion Hosting<\/title>\n<meta name=\"description\" content=\"In this article we&#039;ll discuss a server side fix for the SSL 3.0 (Secure Socket Layer) and TLS 1.0 (Transport Layer Security) vulnerability in handling ciphers that use CBC (Cipher-Block-Chaining).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect against SSL\/TLS CBC vulnerability | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"In this article we&#039;ll discuss a server side fix for the SSL 3.0 (Secure Socket Layer) and TLS 1.0 (Transport Layer Security) vulnerability in handling ciphers that use CBC (Cipher-Block-Chaining).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Support Center\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-11-06T19:16:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-17T03:29:38+00:00\" \/>\n<meta name=\"author\" content=\"InMotion Hosting Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/InMotionHosting\" \/>\n<meta name=\"twitter:site\" content=\"@InMotionHosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/\"},\"author\":{\"name\":\"InMotion Hosting Contributor\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\"},\"headline\":\"Protect against SSL\/TLS CBC vulnerability\",\"datePublished\":\"2012-11-06T19:16:38+00:00\",\"dateModified\":\"2021-08-17T03:29:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/\"},\"wordCount\":495,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"articleSection\":[\"Secure Socket Layer (SSL)\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/\",\"name\":\"Protect against SSL\/TLS CBC vulnerability | InMotion Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\"},\"datePublished\":\"2012-11-06T19:16:38+00:00\",\"dateModified\":\"2021-08-17T03:29:38+00:00\",\"description\":\"In this article we'll discuss a server side fix for the SSL 3.0 (Secure Socket Layer) and TLS 1.0 (Transport Layer Security) vulnerability in handling ciphers that use CBC (Cipher-Block-Chaining).\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inmotionhosting.com\/support\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect against SSL\/TLS CBC vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"name\":\"InMotion Hosting Support Center\",\"description\":\"Web Hosting Support &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\",\"name\":\"InMotion Hosting\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"width\":696,\"height\":696,\"caption\":\"InMotion Hosting\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/inmotionhosting\/\",\"https:\/\/x.com\/InMotionHosting\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644\",\"name\":\"InMotion Hosting Contributor\",\"description\":\"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/inmotion-hosting\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting\"],\"url\":\"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect against SSL\/TLS CBC vulnerability | InMotion Hosting","description":"In this article we'll discuss a server side fix for the SSL 3.0 (Secure Socket Layer) and TLS 1.0 (Transport Layer Security) vulnerability in handling ciphers that use CBC (Cipher-Block-Chaining).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Protect against SSL\/TLS CBC vulnerability | InMotion Hosting","og_description":"In this article we'll discuss a server side fix for the SSL 3.0 (Secure Socket Layer) and TLS 1.0 (Transport Layer Security) vulnerability in handling ciphers that use CBC (Cipher-Block-Chaining).","og_url":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/","og_site_name":"InMotion Hosting Support Center","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting\/","article_published_time":"2012-11-06T19:16:38+00:00","article_modified_time":"2021-08-17T03:29:38+00:00","author":"InMotion Hosting Contributor","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/InMotionHosting","twitter_site":"@InMotionHosting","twitter_misc":{"Written by":"InMotion Hosting Contributor","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/"},"author":{"name":"InMotion Hosting Contributor","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644"},"headline":"Protect against SSL\/TLS CBC vulnerability","datePublished":"2012-11-06T19:16:38+00:00","dateModified":"2021-08-17T03:29:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/"},"wordCount":495,"commentCount":6,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"articleSection":["Secure Socket Layer (SSL)"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/","url":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/","name":"Protect against SSL\/TLS CBC vulnerability | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#website"},"datePublished":"2012-11-06T19:16:38+00:00","dateModified":"2021-08-17T03:29:38+00:00","description":"In this article we'll discuss a server side fix for the SSL 3.0 (Secure Socket Layer) and TLS 1.0 (Transport Layer Security) vulnerability in handling ciphers that use CBC (Cipher-Block-Chaining).","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/support\/website\/ssl\/protect-against-ssl-tls-cbc-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/support\/"},{"@type":"ListItem","position":2,"name":"Protect against SSL\/TLS CBC vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/support\/#website","url":"https:\/\/www.inmotionhosting.com\/support\/","name":"InMotion Hosting Support Center","description":"Web Hosting Support &amp; Tutorials","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/support\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/support\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","width":696,"height":696,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting\/","https:\/\/x.com\/InMotionHosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/f9a4fc454cd1df128ee8e898d30d4644","name":"InMotion Hosting Contributor","description":"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!","sameAs":["https:\/\/www.linkedin.com\/company\/inmotion-hosting\/","https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting"],"url":"https:\/\/www.inmotionhosting.com\/support\/author\/inmotion-hosting-contributor\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":null,"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/users\/57014"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/comments?post=464"}],"version-history":[{"count":3,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/464\/revisions"}],"predecessor-version":[{"id":85369,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/464\/revisions\/85369"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/media?parent=464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/categories?post=464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/tags?post=464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}