Re: Compromised postgresql instances

Поиск
Список
Период
Сортировка
От Andrew Dunstan
Тема Re: Compromised postgresql instances
Дата
Msg-id ce516224-0c26-2eae-1976-897f40a77375@2ndQuadrant.com
обсуждение исходный текст
Ответ на Re: Compromised postgresql instances  (Andrew Gierth <andrew@tao11.riddles.org.uk>)
Список pgsql-hackers

On 06/09/2018 03:27 AM, Andrew Gierth wrote:
>>>>>> "Thomas" == Thomas Kellerer <spam_eater@gmx.net> writes:
>   Thomas> And a blog post going into details on how that specific attack works.
>
>   Thomas>
https://www.imperva.com/blog/2018/03/deep-dive-database-attacks-scarlett-johanssons-picture-used-for-crypto-mining-on-postgre-database/
>
> *headdesk*
>
> *headdesk*
>
> *headdesk*
>
> FOR THE LOVE OF LITTLE APPLES, why, in an article as comprehensive as
> this, did they not list in the "quick tips" at the end, the quickest and
> most absolutely basic and essential tip of all, which is "don't open up
> your database for superuser access from the whole world" ???
>
> To become vulnerable to this attack, you have to do ALL of these:
>
>    - give your db a public IP
>    - allow access (or forget to prevent access) to it through any
>      firewall
>    - configure pg to listen on the public IP
>    - explicitly add an entry to pg_hba.conf that allows access from
>      0.0.0.0/0 for all users or at least the postgres user
>    - AND have a guessable password on the postgres user or explicitly
>      use "trust" on the above hba entry
>
> *headdesk*
>


Against stupidity the Gods themselves contend in vain.

cheers

andrew

-- 
Andrew Dunstan                https://www.2ndQuadrant.com
PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services



В списке pgsql-hackers по дате отправления:

Предыдущее
От: Andrew Gierth
Дата:
Сообщение: Re: Compromised postgresql instances
Следующее
От: Simon Riggs
Дата:
Сообщение: Re: hot_standby_feedback vs excludeVacuum and snapshots