Redis is an open source, network-based, memory-based, and persistent log-based, Key-Value database written in ANSI C. It also provides APIs in multiple languages. Recently, a vulnerability in Redis that allows Getshell through master-slave replication was exposed.
In Redis 4.x and above, because of the new module function, attackers can construct malicious code to make the attacked server load malicious .so files. If redis-server is started with root privileges, the malicious code can be executed, and the attacker can create any file he wants on the server, which is very harmful. The author of Redis believes in "simplicity is beauty", so he did not design a complex security configuration for Redis. So how do we ensure the security of Redis? Configure firewall to protect redis Prevent external users from accessing its redis port by configuring a firewall. Do not use the default port of redis Prevent external users from accessing Redis, specify the trusted Redis IP, prevent external access, and only trusted user IPs can access the Redis port. If it is not prohibited, it is very likely that all data will be deleted when attacked from the outside. Set password authorization when accessing redis Redis forces password authentication for instances in classic networks. Users can set complex passwords to prevent passwords from being cracked. It should be noted that the password strength should be set high enough, such as more than 32 bits. Redis has very good performance, and can reach 150,000 times per second if the password is cracked by brute force. Use the disable command In Redis, you can disable commands or rename them to names that are difficult to guess, so that only internal users can use these renamed names, and general users can only use a subset of commands. Renaming some dangerous commands can prevent malicious operations, which is equivalent to turning the command name into a password that only internal personnel know. Redis has worked hard to optimize high performance and ease of use, but has not optimized security. Therefore, Redis needs to run in a secure environment, and the external security of Redis must be well done. |
<<: How are 5G charges calculated: This is what the operators say. Are you willing to pay more?
>>: Wi-Fi 6 is here: These 12 questions will clarify it for you
Education is a national priority. my country has ...
In order to implement the deployment requirements...
[[321085]] Recently, new infrastructure has conti...
In the next few years, the general direction of n...
This article is reprinted from the WeChat public ...
Rabisu was founded in 2016. It is a Turkish merch...
I guess everyone here is already familiar with th...
【51CTO.com original article】 On September 13, 201...
Internet speed is getting slower and slower? The ...
If you've ever bought a Wi-Fi router, you pro...
1. FTTH troubleshooting steps Step 1: Check the s...
On January 10, Miao Wei, Minister of Industry and...
Today, at HUAWEI CONNECT 2020, Hou Jinlong, Presi...
ProfitServer recently offered a 50% discount on s...
◎ Science and Technology Daily reporter Liu Yan O...