Re: Compromised postgresql instances

From: Andrew Dunstan <andrew(dot)dunstan(at)2ndquadrant(dot)com>
To: Andrew Gierth <andrew(at)tao11(dot)riddles(dot)org(dot)uk>, pgsql-hackers(at)postgresql(dot)org
Subject: Re: Compromised postgresql instances
Date: 2018-06-09 12:36:01
Message-ID: ce516224-0c26-2eae-1976-897f40a77375@2ndQuadrant.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On 06/09/2018 03:27 AM, Andrew Gierth wrote:
>>>>>> "Thomas" == Thomas Kellerer <spam_eater(at)gmx(dot)net> writes:
> Thomas> And a blog post going into details on how that specific attack works.
>
> Thomas> https://www.imperva.com/blog/2018/03/deep-dive-database-attacks-scarlett-johanssons-picture-used-for-crypto-mining-on-postgre-database/
>
> *headdesk*
>
> *headdesk*
>
> *headdesk*
>
> FOR THE LOVE OF LITTLE APPLES, why, in an article as comprehensive as
> this, did they not list in the "quick tips" at the end, the quickest and
> most absolutely basic and essential tip of all, which is "don't open up
> your database for superuser access from the whole world" ???
>
> To become vulnerable to this attack, you have to do ALL of these:
>
> - give your db a public IP
> - allow access (or forget to prevent access) to it through any
> firewall
> - configure pg to listen on the public IP
> - explicitly add an entry to pg_hba.conf that allows access from
> 0.0.0.0/0 for all users or at least the postgres user
> - AND have a guessable password on the postgres user or explicitly
> use "trust" on the above hba entry
>
> *headdesk*
>

Against stupidity the Gods themselves contend in vain.

cheers

andrew

--
Andrew Dunstan https://www.2ndQuadrant.com
PostgreSQL Development, 24x7 Support, Remote DBA, Training & Services

In response to

Browse pgsql-hackers by date

  From Date Subject
Next Message Simon Riggs 2018-06-09 13:00:36 Re: hot_standby_feedback vs excludeVacuum and snapshots
Previous Message Andrew Gierth 2018-06-09 07:27:43 Re: Compromised postgresql instances