为什么我的 RDS 实例有 2 个未加密的 rdsadmin 连接?

问题描述 投票:0回答:1

当我查看与 RDS 实例的未加密连接时,我看到来自

rdsadmin
用户的 2 个连接。这些不是来自我的应用程序,必须由 AWS 管理。有关于这些的任何文档,或者如何强制它们使用加密吗?

select * from pg_stat_ssl join pg_stat_activity on pg_stat_ssl.pid = pg_stat_activity.pid where ssl = 'f';


-[ RECORD 1 ]----+---------------------------------
pid              | 15497
ssl              | f
version          | 
cipher           | 
bits             | 
client_dn        | 
client_serial    | 
issuer_dn        | 
datid            | 16384
datname          | rdsadmin
pid              | 15497
leader_pid       | 
usesysid         | 10
usename          | rdsadmin
application_name | PostgreSQL JDBC Driver
client_addr      | 
client_hostname  | 
client_port      | -1
backend_start    | 2023-08-10 10:49:38.897878+00
xact_start       | 
query_start      | 2023-08-24 00:04:46.134798+00
state_change     | 2023-08-24 00:04:46.134818+00
wait_event_type  | Client
wait_event       | ClientRead
state            | idle
backend_xid      | 
backend_xmin     | 
query_id         | 
query            | SELECT value FROM rds_heartbeat2
backend_type     | client backend
-[ RECORD 2 ]----+---------------------------------
pid              | 6860
ssl              | f
version          | 
cipher           | 
bits             | 
client_dn        | 
client_serial    | 
issuer_dn        | 
datid            | 16384
datname          | rdsadmin
pid              | 6860
leader_pid       | 
usesysid         | 10
usename          | rdsadmin
application_name | 
client_addr      | 
client_hostname  | 
client_port      | -1
backend_start    | 2023-08-12 20:39:03.838202+00
xact_start       | 
query_start      | 2023-08-24 00:04:52.645568+00
state_change     | 2023-08-24 00:04:52.645632+00
wait_event_type  | Client
wait_event       | ClientRead
state            | idle
backend_xid      | 
backend_xmin     | 
query_id         | 3694949039461716331
query            | COMMIT
backend_type     | client backend
postgresql amazon-rds postgresql-14
1个回答
0
投票

-1 的 client_port 表示这些是通过 Unix 域套接字的本地连接。这些不支持 SSL,也不需要它。由于数据不穿越网络,因此不易受到窃听/中间人攻击。任何能够掌握传输中数据的人都已经能够为所欲为。

© www.soinside.com 2019 - 2024. All rights reserved.