--- name: Acessos servidores Intranet description: Credenciais SSH/SCP/DB e particularidades de cada servidor usado pelo sistema type: reference originSessionId: 2b74afa8-ad08-407b-80cf-49ce17097f66 --- # Acessos servidores ## Servidor de Hospedagem (sistema.gotechbr.com.br) ```bash # SSH PORTA 1907 (mudada 2026-04-30 apos CVE-2026-41940 — porta 22 fechada) plink -pw 'QVxdH6beewndm7Vj8nTvKTokr6eFJNvFy' -P 1907 -batch -no-antispoof root@server.whmservidor.com # Primeira conexao (host key cache vazio): pre-aceitar echo y | plink -pw 'QVxdH6beewndm7Vj8nTvKTokr6eFJNvFy' -P 1907 -no-antispoof root@... "comando" # SCP pscp -P 1907 -pw 'QVxdH6beewndm7Vj8nTvKTokr6eFJNvFy' -batch root@server.whmservidor.com: # DB mysql -u gotechbr_intranete -p'f%fpDIf]Q@*q' gotechbr_intranete ``` **IMPORTANTE 2026-04-30**: Servidor invadido via CVE-2026-41940 (auth bypass cPanel). Patch aplicado (cPanel 11.126.0.54), backdoor `/usr/bin/.system_cache` quarentenado, 66 IPs atacantes bloqueados, senha root rotacionada, SSH porta movida 22→1907. Detalhes em [[incidente_cve_2026_41940]]. - **Path da aplicacao**: `/home/gotechbr/public_html/sistema.gotechbr/` - **OPcache**: `validate_timestamps = 0` → SEMPRE rodar `pkill php-cgi` apos deploy - **`.htaccess`** bloqueia acesso direto a PHP (exceto `index.php`) — usar rotas CI4 - **CRLF**: arquivos no servidor DEVEM ser LF. Ver [[deploy_procedimento]] ## Servidor Baileys API (208.110.85.226) ```bash # SSH plink -pw wPzy9BYkQFrR -batch -no-antispoof customer@208.110.85.226 # Root echo 'wPzy9BYkQFrR' | sudo -S # PM2 (precisa carregar nvm) export NVM_DIR=/root/.nvm && source /root/.nvm/nvm.sh && nvm use v18.20.2 && pm2 ... ``` - **API principal**: porta 8000 (TSeD framework, `/root/api-teste2/`) - **Profile Pic / micro-server**: porta 8001 (Express adicionado via `dist/index.js`) - **Instances** exportadas de `dist/controllers/InstanceController.js` via `exports.instances` - **MeshCentral PM2**: id 5 (`meshcentral`) ## Servidor Magnus Billing (69.197.165.194) ```bash plink -pw 3mDxRgKbtE -batch -no-antispoof customer@69.197.165.194 ``` - **sudo**: senha = SSH (`3mDxRgKbtE`) - **API**: `http://69.197.165.194/mbilling` (path `/mbilling` obrigatorio) - **API Key**: `137dcec44002170db2d2dcd9c70dbebf` - **API Secret**: `a6b78c3080f6587975d33fcd8eba2336896589dd379848f2228f4d067cc43e5a` - **Auth**: HMAC-SHA512 (headers `Key` + `Sign`), POST com body - Detalhes: [[servidor_magnus]] ## MeshCentral (mesh.gotechbr.com.br) - **Dominio**: `mesh.gotechbr.com.br` (DNS → 208.110.85.226) - **SSL**: Let's Encrypt via certbot (valido ate 2026-06-04) - **Login admin**: `admin` / `GoTechBR2026` - **Login Token (iframe)**: user=`~t:zJw5YwGSksjvgNTb` pass=`kfQHHiNrIg6FkG1HrcP7` (expira 2027-03-06) - Agent auto-instalado pelo notifier (`mesh_agent.py`) com UAC elevation ## URLs publicas - **Sistema**: `https://sistema.gotechbr.com.br/` - **Area Cliente**: `https://cliente.gotechbr.com.br/login` - **Aprovacao Publica**: `https://aprovacao.gotechbr.com.br/` ## Instancias Baileys (CRITICO — nao confundir) | Instancia | Key | Numero | |-----------|-----|--------| | **GotechBr (SISTEMA)** | `be3c97d7-5a59-48e1-ba19-a2a205046113` | `553135003516` | | GotechBr Financeiro (NAO MEXER) | `QLh063KG7xL0kmEY0U5EhH0x1Qt1mhI2thuPN` | `553184932799` | | Agnaldo (NAO MEXER) | `137371875097838` | `553189049626` | > Instance key muda a cada re-scan QR. Atualizar DB `whatsapp_sessions` quando mudar.