This is an old revision of the document!


LSMCD Secure User Data Using SASL

SASL (Simple Application and Security Layer) is the method used to secure data in LSMCD and Memcached. For details on the use of SASL in LSMCD see https://www.litespeedtech.com/support/wiki/doku.php/litespeed_wiki:lsmcd:new_sasl

This wiki discusses a feature of LSMCD which is not available in traditional memcached: separation of individual user's data. This means that data saved by one user is not visible to any other users. In memcached and traditional LSMCD, any data stored is available to all users which allows fast population of the cache and high utilization. However, it is insecure and thus can't be used to cache any data which is deemed to be sensitive. You must have LSMCD v1.2 or higher to use this feature.

This option allows data to be available to only the user authorized to access it. Thus the advantages of memcached performance becomes available to sensitive data.

Enabling SASL user protection is database wide. Once SASL user protection is enabled, all non-SASL user protected databases will need to be regenerated. You will also need to regenerate your databases (the files stored in the Cached.ShmDir parameter of your node.conf file) if you wish to remove SASL or SASL user protection.

To enable separating data by users, you need to specify in your node.conf file:

Cached.DataByUser=true

As mentioned above, once you have made this change you must delete your existing databases or LSMCD will refuse to come up as it will notice the changed data condition.

The default is false so that data created by all users is visible to all users. Once this is enabled each user's data can only be visible to that user.

Use

LSMCD can be used once configured and activated using the traditional memcached protocols and user commands. However, any data visible will only be visible to the authenticated user that created it. This means that the same data may be stored multiple times for separate users, but each user will only see the data created by that user. Expiration and deletion will again by based on the criteria set when the user created the data or on the parameters for the system as a whole.

The default size for a user If you specify a realm qualified name (a name with a @hostname suffix) in your application, then that name will be used for storage. If you then specify a non-realm qualified name then the unqualified name will be resolved as a different name. This is so that names that appear different are handled differently.

Each user is designated a slice and all traffic will be sent to that slice. However, the size of the hash is determined individually for each user. So Cached.MemMaxSz can be specified to a non-zero value to limit the number of bytes a given user will be allowed to store before least recently used techniques will be used to reduce the data in the cache.

Anonymous User

To support the use of code that does not include authentication information (old code or code which wishes to use the facility but does not wish to deal with authentication), you can allow unauthenticated (anonymous) users to create and access data on your server that is distinct and separate from that created by authenticated users.

To enable separating data by users, you need to specify in your node.conf file:

Cached.Anonymous=true

This does not create a security hole as the data stored and accessed by unauthenticated users is totally separate from data stored for authenticated users when Cached.DataByUser is enabled.

The default is false so that you do not mistakenly allow unauthenticated users access to memcached facilities (even though the data would be separated).

  • Admin
  • Last modified: 2018/06/28 19:17
  • by Robert Perper