Schedule Meeting

a

3.6 millions MySQL servers accessible from the web. Hints to keep yours secure

by | Jun 9, 2022 | MySQL

Need Help?  Click Here for Expert Support

Shadowserver has announced that they found over 3.6 million MySQL servers exposed to the web, following their Accessible MySQL Server Report.

At Vettabase we have no way to verify their data (it would be quite surprising if we had!), but we have no reasons to think they lied or exaggerated. And, alas, their numbers don’t surprise us.

Here I want to share some hints about avoid exposing MySQL/MariaDB servers to the internet, and some security features related to this problem.

About versions and forks

They show statistics about the MySQL versions they found. The version numbers show it is MySQL, not MariaDB. But it could very well include Percona Server or cloud vendor forks. That said, I don’t suspect that the percentage of MariaDB insecure installations is much different.

Some of the versions they found are no longer supported. Specifically: 5.5 and 5.6. Security fixes are not released anymore for those versions. This makes the problem worse.

How to avoid exposing a server to the internet

In some rare cases, MySQL/MariaDB don’t need to use the network at all. This happens if they are only used by an application that runs on the local host. For example, if it’s used by a desktop application that runs on the user’s laptop, or if it’s used by a mail server to store emails.

In that case, just set bind_address=localhost or bind_address=127.0.0.1. MySQL/MariaDB will refuse connections from the network.

However, most servers need to communicate with application servers. No worries: they can do it safely inside a private network. Setting up a secure network is a task for a network engineer or a system administrator. When in-premise, this is done with a firewall that blocks connections unless they adhere to certain rules. For example, it can only allow connections to a specific address on the port 80, and forward them to a web proxy. Cloud vendors offer some native form of isolated networks, such as AWS security groups or network ACLs. One still needs to configure them properly.

Virtual private networks are a plus. Remember: just like traditional networks, they are only safe until an attacker gains access to them. There is a common misconception that this is nearly impossible with a VPN. But VPNs have bugs, and even more importantly, they are used by humans. Humans send VPN configuration files insecurely to save some minutes, and are vulnerable to social engineering attacks. And stealing your VPN configuration file could be as simple as stealing your employer’s laptop at the airport/on the train/at a cool industry event. So, while VPNs are great, we recommend to use them in combination with all traditional security practices.

Where applicable, also use iptables or equivalent technologies to make sure that most ports do not accept any incoming connections. Use MySQL Guide to Ports and Galera network ports as a reference, and make sure that other hosts can’t reach unexpected ports.

MySQL and MariaDB features that mitigate or increase the risks

Some MySQL/MariaDB features can mitigate security risks or increase them. While the basic thing to remember is that MySQL/MariaDB should never be exposed to the internet, knowing the pros and cons of these features is also very important.

This list is not intended to be exhaustive.

Good: Bound users to specific hostnames or subnets

When you create a user, you can specify from which hostnames/IPs the user can connect:

CREATE USER 'web-app'@'web-%';
CREATE USER 'web-app'@'198.51.100.0/255.255.255.0';

In my contents, I try to use two terms in an unambiguous way: username and account. In this example the user web-app has two accounts: one can connect from any server with a hostname starting with web-, the other can connect from a subnet with an IPv4 in the specified subnet.

This is generally an excellent practice. If it is used methodically, it protects databases from internal attackers (e.g., employees secretly working for a competitor) and external attackers (in the unfortunate case you expose your server to the internet, voluntarily or by mistake). But don’t rely on this feature alone: avoid exposing your server to the internet.

Bad: MySQL password locking

MySQL 8 has a password locking feature. An account can be created in this way:

CREATE USER 'john.doe'@'%'
    IDENTIFIED BY RANDOM PASSWORD
    FAILED_LOGIN_ATTEMPTS 4
    PASSWORD_LOCK_TIME 1;

This means that, if the user enters a wrong password 4 times, the account gets locked for 1 day. This makes DoS attacks trivial, especially if the server is exposed to the web.

Of course, one should also guess an existing username. But that could be quite easy, in many cases. One could start by root, admin (RDS), wordpress, wp… did you already blush or should I add some guesses to the list? 🙂

We can say that using this feature is a tradeoff that I don’t recommend. It makes brute force attacks impossible, but in exchange it enables trivially easy DoS attacks against a user. And that user may be a web application or the DBAs.

Good: Password validation plugins

Both MySQL and MariaDB support password validation plugins. By enabling them, you can make passwords more secure. Again: this won’t be enough if your server is exposed to the internet.

Good: Password expire

In MySQL 8, a user can be created in this way:

CREATE USER 'john.doe'@'%'
    IDENTIFIED BY RANDOM PASSWORD
    PASSWORD EXPIRE INTERVAL 30 DAY;

The user will be forced to choose a new password after 30 days. Other options can be used to prevent a user from re-using a password that was already used in the past. In this way, any attacker that may have found their password won’t be able to access the database again.

But it’s worth stressing again that this only mitigates a problem. Database servers should not be exposed to the internet.

Good: MariaDB unix_socket

By default, MariaDB comes with the unix_socket plugin enabled for root. This means that the DBAs need to log into the Linux system in order to be allowed to connect MariaDB. No other password will be required. That is a very good practice, because it avoids allowing superuser accesses from the internet.

Allowing an authenticated Linux user to access MariaDB without further authentication is not a security risk, because root users can do whatever they want anyway: uninstall MariaDB, take a copy of the database, erase data, manipulate data…

With unix_socket you connect as root locally, but you have other users who can connect MariaDB via a network. So, security good practices are still needed.

Conclusions

The Shadowserver report shows that many organisations don’t follow the most basic database security rule: don’t expose a database server to the internet. We discussed several MySQL/MariaDB features that can mitigate this problem or make it worse – and, in any case, they are very important aspects of database security.

Security is a huge topic and I could have mentioned many other features – but, for example, there’s not point in granting granular permissions if anyone with an internet connection can attempt to find your root password.

If you have troubles implementing these recommendations, or if you need advice related to your particular circumstances, consider our Database Health Checks. This service analyses every aspect of database and system configuration, including security.

All content in this blog is distributed under the CreativeCommons Attribution-ShareAlike 4.0 International license. You can use it for your needs and even modify it, but please refer to Vettabase and the author of the original post. Read more about the terms and conditions: https://creativecommons.org/licenses/by-sa/4.0/

About Federico Razzoli
Federico Razzoli is a database professional, with a preference for open source databases, who has been working with DBMSs since year 2000. In the past 20+ years, he served in a number of companies as a DBA, Database Engineer, Database Consultant and Software Developer. In 2016, Federico summarized his extensive experience with MariaDB in the “Mastering MariaDB” book published by Packt. Being an experienced database events speaker, Federico speaks at professional conferences and meetups and conducts database trainings. He is also a supporter and advocate of open source software. As the Director of Vettabase, Federico does business worldwide but prefers to do it from Scotland where he lives.

Recent Posts

Getting Started with MindsDB and MySQL

Getting Started with MindsDB and MySQL

If you have not already heard, Vettabase is now a partner of MindsDB, working on improving MySQL compatibility. In this post we shall take a look at getting started with MindsDB by connecting to MySQL and some of the improvements to date. We have a ready to go example...

MariaDB/MySQL: working with storage engines

MariaDB/MySQL: working with storage engines

MariaDB and MySQL support several storage engines. See MariaDB and MySQL storage engines: an overview for a discussion about existing MariaDB and MySQL storage engines. Here we'll see how to work with them. We'll see how to obtain information about storage engines,...

MariaDB and MySQL storage engines: an overview

MariaDB and MySQL storage engines: an overview

MySQL was the first DBMS to introduce the concept of storage engines in the early 2000s. This was one of its main features. Later, MariaDB extended the storage engine API and included some storage engine maintained by third parties as part of its official...

Services

Need Help?  Click Here for Expert Support

2 Comments

  1. Satsuah

    Hi,
    What is your opinion about adopting cis benchmarks for mysql?
    How much does that help?

    Regards,
    Satsuah

    Regards

    Reply
    • Federico Razzoli

      Hi Satsuah,

      We never used CIS benchmarks, so I don’t know how good they are. I’ll try to take a look at them soon if I have some time, but this is not a promise.

      Cheers,
      Federico

      Reply

Submit a Comment

Your email address will not be published. Required fields are marked *