Re: [OT] Microsoft: Kubernetes clusters hacked in malware campaign via PostgreSQL

From: Jeffrey Walton <noloader(at)gmail(dot)com>
To: Dean Rasheed <dean(dot)a(dot)rasheed(at)gmail(dot)com>
Cc: Magnus Hagander <magnus(at)hagander(dot)net>, Pavel Borisov <pashkin(dot)elfe(at)gmail(dot)com>, PostgreSQL mailing lists <pgsql-bugs(at)postgresql(dot)org>
Subject: Re: [OT] Microsoft: Kubernetes clusters hacked in malware campaign via PostgreSQL
Date: 2023-01-10 18:06:16
Message-ID: CAH8yC8m=j8Ruk4q6P4DsWAwb7x3NT2QgMK1her_s=pdXJ0nuMg@mail.gmail.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-bugs

On Tue, Jan 10, 2023 at 12:17 PM Dean Rasheed <dean(dot)a(dot)rasheed(at)gmail(dot)com> wrote:
>
> On Tue, 10 Jan 2023 at 15:07, Magnus Hagander <magnus(at)hagander(dot)net> wrote:
> >
> > The page simply doesn't exist, because the information is sperad out across multiple places. There is indeed a bug in that a link is generated to /current/ even if that page does not exist. But the information that's on there is also wildly out of date. This page was removed from the documentation in 2001, over 20 years ago. Linking to such obsolete pages in an article from 2023 doesn't exactly inspire confidence.
> >
>
> A Google search for "postgresql security" returns that page as the top
> non-featured result.
>
> Looking at the source of that page, it has <meta name="robots"
> content="nofollow" />. Changing that to "noindex" might help.

https://www.google.com/search?q=postgresql+security+hardening+guide
returns one result hosted on the PostgreSQL webserver. It is the old
article that has been condemned by the community.

Jeff

In response to

Browse pgsql-bugs by date

  From Date Subject
Next Message Anbazhagan M 2023-01-10 20:35:05 Re: BUG #17740: Connecting postgresql 13 with different psql versions
Previous Message Dean Rasheed 2023-01-10 17:17:47 Re: [OT] Microsoft: Kubernetes clusters hacked in malware campaign via PostgreSQL