Re: Compromised postgresql instances

2018-06-08 Thread Steve Atkins


> On Jun 8, 2018, at 1:47 PM, Tom Lane  wrote:
> 
> Andrew Dunstan  writes:
>> On 06/08/2018 04:34 PM, Steve Atkins wrote:
>>> I've noticed a steady trickle of reports of postgresql servers being 
>>> compromised via being left available to the internet with insecure or 
>>> default configuration, or brute-forced credentials. The symptoms are 
>>> randomly named binaries being uploaded to the data directory and executed 
>>> with the permissions of the postgresql user, apparently via an extension or 
>>> an untrusted PL.
>>> 
>>> Is anyone tracking or investigating this?
> 
>> Please cite actual instances of such reports. Vague queries like this 
>> help nobody.
> 
> I imagine Steve is reacting to this report from today:
> https://www.postgresql.org/message-id/CANozSKLGgWDpzfua2L=OGFN=dg3po98ujqjj18gbvfr1-yk...@mail.gmail.com
> 
> I recall something similar being reported a few weeks ago,

https://www.postgresql.org/message-id/020901d3f14c%24512a46d0%24f37ed470%24%40gmail.com

> but am
> too lazy to trawl the archives right now.

Yes, plus I recall a couple of discussions on IRC with similar behaviour, and
a few more details about how the binaries were being uploaded.

> 
>> Furthermore, security concerns are best addressed to the security 
>> mailing list.
> 
> Unless there's some evidence that these attacks are getting in through
> a heretofore unknown PG security vulnerability, rather than user
> misconfiguration (such as weak/no password), I'm not sure what the
> security list would have to offer.  Right now it seems like Steve's move
> to try to gather more evidence is quite the right thing to do.

Yeah. It's not a security issue with postgresql itself, I don't believe, so not
really something that has to go to the security alias. It's more of an ops
issue, but I thought I'd ask here to see if anyone was already looking at it,
and to raise a flag if they weren't.

Cheers,
  Steve




Compromised postgresql instances

2018-06-08 Thread Steve Atkins
I've noticed a steady trickle of reports of postgresql servers being 
compromised via being left available to the internet with insecure or default 
configuration, or brute-forced credentials. The symptoms are randomly named 
binaries being uploaded to the data directory and executed with the permissions 
of the postgresql user, apparently via an extension or an untrusted PL.

Is anyone tracking or investigating this?

Cheers,
  Steve