Securing memcache

20
Securing memcache or, Tales from Encryption

description

Slides from Todd Ouska's presentation on Secure Memcache at OSCON 2010. To learn more about secure memcache or the CyaSSL embedded SSL library, visit www.yassl.com.

Transcript of Securing memcache

Page 1: Securing memcache

Securing memcache or, Tales from Encryption

Page 2: Securing memcache

What's memcache?

Page 3: Securing memcache

Who’s big idea?

Page 4: Securing memcache

Why secure memcache?

•  SASL authenticates •  yaSSL also encrypts

Page 5: Securing memcache

Who cares?

•  Policy enforcement •  Sensitive Data •  Masking Data behind firewall

Page 6: Securing memcache

The Cloud Cares

Page 7: Securing memcache

How do I use it?

-T

Page 8: Securing memcache

When is it available?

•  Beta now

Page 9: Securing memcache

How it works

Tcp/ip

CyaSSL

N Clients N Servers

Tcp/IP

CyaSSL

memcache client Encrypted via streaming cipher

Tcp/IP

memcached

Page 10: Securing memcache

What's the Cost?

Page 11: Securing memcache

Database Performance

Page 12: Securing memcache

memcache Performance

Page 13: Securing memcache

AES-256 Performance

Page 14: Securing memcache

Stream RC4 Performance

Page 15: Securing memcache

HC-128 Performance

Page 16: Securing memcache

MD5 HC-128 Performance

Page 17: Securing memcache

Future Performance Directions

AES-NI

Hardware offloading

Page 18: Securing memcache

Alice

Bob

Page 19: Securing memcache
Page 20: Securing memcache

Thanks!

Todd Ouska [email protected] www.yassl.com Open Source Embedded SSL Libraries