09:30
Do not expose port 5432 to the public Internet
2 April 2025
Sometimes, we run into a client who has port 5432 exposed to the public Internet, usually as a convenience measure to allow remote applications to access the database without having to go through an intermediate server appllication.
Do not do this.
This report of a “security issue” in PostgreSQL is alarmist, because it’s a basic brute-force attack on PostgreSQL, attempting to get supueruser credentials. Once it does so, it uses the superuser’s access to the underlying filesystem to drop malware payloads.
There’s nothing special about this. You could do this with password-auth ssh.
But it’s one more reason not to expose PostgreSQL’s port to the public. There are others:
- You open yourself up to a DDOS attack on the database itself. PostgreSQL is not hard to do a DOS attack on, since each incoming connection forks a new process.
- There have been, in the past, bugs in PostgreSQL that could cause data corruption even if the incoming connection was not authenticated.
As good policy:
- Always have PostgreSQL behind a firewall. Ideally, it should have a non-routable private IP address, and only applications that are within your networking infrastructure can get at it.
- Never allow remote logins by superusers.
- Make sure your access controls (
pg_hba.conf
, AWS security groups, etc.) are locked down to the minimum level of access required.
There are no comments yet.
Comment