Closed mjorgegulab closed 12 months ago
As we have checked, This problem is not related to the issuer node.
Postgres, when deployed with Docker on Linux and exposed (with 5432:5432
and not 127.0.0.1:5432:5432
), will end up exposed on the internet if you're not behind a residential router.
Bad actors are scanning the postgres port because they can abuse postgres if it's using the default postgres/postgres
password. This lets them into the container, as an admin, free to do whatever they please.
Then they run crypto miners on your hardware.
That's what happened to me.
Either don't expose on 0.0.0.0
(the default) or change the postgres password.
Thanks @mjorgegulab @chrisDeFouRire. Postgresql, Redis and Vault images are provided only as tool to evaluate the project. Security, backups, maintenance, patches, etc. should be managed by the user.
We take note of your comments.
Hello, in a fresh Debian with only docker + make installed, i saw that something is trying to contact a range of IPs on the postgres port. Is that normal??
I've looked at the issuer-node code and i haven't seen anything related to this event...so...could it be something from the docker postgres image? Thanks in advance 🙃
here you have the result of the logs ⬇️⬇️⬇️