TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Urgent and Important – Rotate Your Amazon RDS, Aurora, and DocumentDB Certs

185 pointsby jeffbarrover 5 years ago

8 comments

Nitramevfankover 5 years ago
Here&#x27;s probably a silly question: Shouldn&#x27;t this work automatically? I just assumed they would have an intermediate CA or whatever it&#x27;s called and have that certificate be signed by some widely trusted CA.<p>Or have they done it in a different way for security reasons?
评论 #21986230 未加载
评论 #21984707 未加载
评论 #21984393 未加载
评论 #21988889 未加载
dperfectover 5 years ago
In the spirit of asking silly questions (as encouraged in some comments here), here&#x27;s mine:<p>My small SaaS company&#x27;s PostgreSQL RDS instance and app servers are in a VPC with security groups configured to only allow connections from the app servers to the DB (no public access to the RDS instance). My client (ruby-pg) on the app servers is connecting via SSL, but not currently with certificate validation (though I believe the cert date still needs to be valid [?], hence the need to rotate the PostgreSQL server&#x27;s certificate).<p>In this scenario, how important is certificate validation? I understand the theoretical risk of clients not being able to fully trust that they&#x27;re connected to the database I intend, but from a practical standpoint, it seems that if an attacker is able to poison the VPC&#x27;s DNS and trick the app servers into connecting to something else, I&#x27;m already hosed and cert validation wouldn&#x27;t do much to help me. Am I missing something obvious and very dangerous?
评论 #21989146 未加载
sturgillover 5 years ago
I created a new RDS instance via Cloudformation just last week and immediately had the notice that I should update the cert. Looks like the new cert will be the default on 1&#x2F;14, but I thought that was really weird.
koksik202over 5 years ago
Great to see Jeff Barr present on Hacker News reminding customers to rotate certs
评论 #21985493 未加载
mabboover 5 years ago
&gt; Next, I update my client applications to use the new certificates. This process is specific to each app and each database client library, so I don’t have any details to share.<p>This is how I lost the last two days of work. Learned a lot at least.
fovcover 5 years ago
Is it possible to simply concatenate the two `bundle` files (2015 and 2019) and feed that to client apps? That would allow updating the client first without changing the db, then updating the db without breaking the client. (Then step 3 would be to update the client to just use the 2019 bundle)
评论 #21986931 未加载
kureikainover 5 years ago
Just think this may important to check if any of your app is using TLS.<p><pre><code> SELECT s.pid, s.ssl, s.version, a.client_addr, a.usename, a.datname, a.query FROM pg_stat_ssl as s JOIN pg_stat_activity as a ON a.pid=s.pid; </code></pre> You can see `t|f` in `ssl` field.
insomniacityover 5 years ago
&gt; Regions – Rotation is needed for database instances in all commercial AWS regions except Asia Pacific (Hong Kong), Middle East (Bahrain), and China (Ningxia).<p>I wonder why?<p>Are these CAs subject to... shall we say, additional goverment oversight?
评论 #21984655 未加载
评论 #21984602 未加载