scaling backend authentication at facebook
play

Scaling Backend Authentication at Facebook Kevin Lewi , Callen Rain , - PowerPoint PPT Presentation

Scaling Backend Authentication at Facebook Kevin Lewi , Callen Rain , Stephen Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang Facebook Infrastructure Security Network Perimeter Trusted Services Building from a Root of Trust ] "


  1. 
 Scaling Backend Authentication at Facebook Kevin Lewi , Callen Rain , Stephen Weis, Yueting Lee, Haozhi Xiong, Benjamin Yang 
 Facebook

  2. Infrastructure Security Network Perimeter Trusted Services

  3. Building from a Root of Trust ] " Walled Garden " Less trust More trust More machines Fewer machines

  4. How can we scale authentication while minimizing our root of trust?

  5. Trusted Components Key Server Root CA (Holds Master Keys) (Signs Certificates) Login Server Authorization Server (Signs Sessions) (Signs ACLs)

  6. Authentication and Authorization Identities Access Control Lists (ACLs) User: "Callen Rain" Resource: 
 "Who can access table X in database Y?" - Identity1 
 Machine: server123.fb.com - Identity2 
 ... Service: Image Uploading

  7. Service Authentication with TLS Identity Distribution Authorization Root CA ACL Check Request Cert Permission Auth Server Check Deploy Cert Permission TLS Client ACL Server

  8. Service Authentication with TLS Check ALLOW I am "Client" Permission ACL: 
 Client Server “Client is ok”

  9. Service Authentication with TLS Client 1 Check ALLOW ? Permission ACL: 
 Client 2 Server “Client is ok” Client 3

  10. Intermediate Proxies Check REJECT I am "Client" I am "Proxy" Permission ACL: 
 Client Proxy Server “Client is ok”

  11. Intermediate Proxies Check ALLOW ALLOW ACL: 
 I am "Client" I am "Proxy" Permission "Client is ok" 
 Client Proxy Server "Proxy is ok" Check Permission ACL: 
 "Client is ok" 
 "Proxy is ok"

  12. Intermediate Proxies Check ACL: 
 Permission Server 1 Proxy Client 1 "Client 1 is ok" ACL: 
 Client 2 Server 2 Proxy "Client 2 is ok" ACL: 
 Client 3 Proxy Server 3 "Client 3 is ok" Check Permission ?

  13. Tokens $ Check ALLOW Permission ACL: 
 Client Proxy Server “Client is ok” TLS TLS

  14. Tokens 1. Certificate-Based Tokens 2. Crypto Auth Tokens (CATs)

  15. Certificate-Based Tokens $ Client Proxy Server build( ) verify( ) CA Cert Key Cert

  16. Certificate-Based Token Creation - client certificate - proxies Cert - metadata - resource - signature - actions serialize 1d229271928d3f9e2bb0375bdf572d 396fae9206628714fb2ce00f72e94f2 258f6ce5857596baa7e917bc7 ff f34f b8730b48d248969ecc2d86151b63c 214b0eba55fb8730b48d248969ecc2 d86151b63c214b0eba55bda19e0b1 5fde576ce41679aa47656b256a11df signature( private key, metadata ) Key 5e110124750ba169fdbfb8730b48d2 48969ecc2d86151b63c214b0eba55 db6c6d348d9

  17. Certificate-Based Token Verification Certificate-Based Token Signature Token Data Certificate Proxy Resource Actions

  18. Caching Certificate-Based Tokens $ Client Proxy Server hash(metadata) hash( ) metadata $ $ LRU Creation Cache LRU Validation Cache

  19. Tradeo ff s with Cert-Based Tokens Pros Cons Reliable Large Simple Public-Key Generic x509

  20. A Symmetric-Key Variant (analogous to Kerberos) MAC $ Proxy Client Server session key "service name" service key Key Server All direct communications are encrypted / authenticated with TLS

  21. "Crypto Auth Tokens" (CATs) = MAC(session key, request) || client + "info" $ Login Server Proxy Client Server session key "service name" service key Key Server service key = PRF(master key, "service" + info) session key = PRF(service key, "client" + info) All direct communications are encrypted / authenticated with TLS

  22. Summary 1. We build from a small root of trust 
 2. TLS by itself isn't enough 
 3. Tokens Public-Key • Symmetric-Key •

  23. Acknowledgments

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend