SlideShare a Scribd company logo
Redis - Security
Eng. Ismail Enjreny
Email: ismaeel.enjreny@gmail.com
Redis Security
• Redis is designed to be accessed by trusted clients inside trusted environments
• in the common context of a web application implemented using Redis, the clients inside the front-end
(web side) of the application will query Redis
• Redis is not optimized for maximum security but for maximum performance and simplicity
Network security
• Access to the Redis port should be denied to everybody but trusted clients in the network, so the
servers running Redis should be directly accessible only by the computers implementing the application
using Redis
• By default Redis listens for connections from all the network interfaces available on the server
• It is possible to listen to just one or multiple interfaces using the "bind" configuration directive, followed
by one or more IP addresses
• bind 192.168.1.100 10.0.0.1
• bind 127.0.0.1
Authentication feature
• Redis provides a tiny layer of authentication that is optionally turned on editing the redis.windows.conf
file
• When the authorization layer is enabled, Redis will refuse any query by unauthenticated clients
• A client can authenticate itself by sending the AUTH command followed by the password
• The password is set by the system administrator in clear text inside the redis.conf file. It should be long
enough to prevent brute force attacks for two reasons
• Redis is very fast at serving queries. Many passwords per second can be tested by an external client
• The Redis password is stored inside the redis.windows.conf file and inside the client configuration, so it does
not need to be remembered by the system administrator, and thus it can be very long
• requirepass YOUR_LONG_PASSWORD
Data encryption support
• Redis does not support encryption
• In order to implement setups where trusted parties can access a Redis instance over the internet or
other untrusted networks, an additional layer of protection should be implemented
• We recommend spiped
Disabling of specific commands
• It is possible to disable commands in Redis or to rename them into an unguessable name, so that
normal clients are limited to a specified set of commands
• rename-command CONFIG b840fc02d524045429941cc15f59e41cb7be6c52
• It is also possible to completely disable it (or any other command) by renaming it to the empty string,
like in the following example:
• rename-command CONFIG ""
String escaping and NoSQL injection
• The Redis protocol has no concept of string escaping, so injection is impossible under normal
circumstances using a normal client library
• The protocol uses prefixed-length strings and is completely binary safe
• Lua scripts executed by the EVAL and EVALSHA commands follow the same rules, and thus those
commands are also safe
Got hacked
• http://antirez.com/news/96
Redis Security

More Related Content

PPTX
Redis - Partitioning
PPTX
Redis Clients Handling
PPTX
Moving Beyond Cache by Yiftach Shoolman Redis Labs - Redis Day Seattle 2020
PPTX
Securing the Helix Platform at Citrix
PPTX
Practical Use Cases for ACLs in Redis 6 by Jamie Scott - Redis Day Seattle 2020
PPTX
Anatomy of a Redis Command by Madelyn Olson of Amazon Web Services - Redis Da...
PPTX
What's New in NGINX Plus R7?
PPTX
Key Performance Indicators for Managing MongoDB and Recommended Production Co...
Redis - Partitioning
Redis Clients Handling
Moving Beyond Cache by Yiftach Shoolman Redis Labs - Redis Day Seattle 2020
Securing the Helix Platform at Citrix
Practical Use Cases for ACLs in Redis 6 by Jamie Scott - Redis Day Seattle 2020
Anatomy of a Redis Command by Madelyn Olson of Amazon Web Services - Redis Da...
What's New in NGINX Plus R7?
Key Performance Indicators for Managing MongoDB and Recommended Production Co...

What's hot (20)

PPTX
Gears of Perforce: AAA Game Development Challenges
PPT
Gathering technical requirements
KEY
Nginx in production
PDF
(ATS4-PLAT08) Server Pool Management
ODP
Nagios Conference 2011 - Nicholas Scott - Nagios Performance Tuning
PDF
Reliable dedicated server hosting provider
PPTX
Metrics are Not Enough: Monitoring Apache Kafka / Gwen Shapira (Confluent)
PPTX
Maximizing PHP Performance with NGINX
PPTX
Configuration management comes to Windows
PPTX
Analyzing NGINX Logs with Datadog
PPTX
How to Flip a Switch for 55% Web Performance Gains
PDF
Team 4 Presents: The Client Server Model
PDF
NGINX ADC: Basics and Best Practices
PPTX
What’s New at Cloudflare: New Product Launches
PPTX
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
PPTX
NGINX Plus R18: What's new
PDF
Java Middleware Surgery
PDF
Optimizing Proxy Server Performance
PPTX
Tips from Support: Always Carry a Towel and Don’t Panic!
Gears of Perforce: AAA Game Development Challenges
Gathering technical requirements
Nginx in production
(ATS4-PLAT08) Server Pool Management
Nagios Conference 2011 - Nicholas Scott - Nagios Performance Tuning
Reliable dedicated server hosting provider
Metrics are Not Enough: Monitoring Apache Kafka / Gwen Shapira (Confluent)
Maximizing PHP Performance with NGINX
Configuration management comes to Windows
Analyzing NGINX Logs with Datadog
How to Flip a Switch for 55% Web Performance Gains
Team 4 Presents: The Client Server Model
NGINX ADC: Basics and Best Practices
What’s New at Cloudflare: New Product Launches
DNS Security (DNSSEC) With BIG-IP Global Traffic Manager
NGINX Plus R18: What's new
Java Middleware Surgery
Optimizing Proxy Server Performance
Tips from Support: Always Carry a Towel and Don’t Panic!
Ad

Similar to Redis Security (20)

PDF
quickguide-einnovator-9-redis
PDF
Redis SoCraTes 2014
PPT
Introduction to redis
PDF
Redis 101
PDF
Everything you always wanted to know about Redis but were afraid to ask
PDF
quickguide-einnovator-10-redis-admin
PPTX
Redis in 20 minutes
ODP
An Introduction to REDIS NoSQL database
PPTX
Redis meetup
PPTX
PDF
Secure Redis Cluster At Box: Vova Galchenko, Ravitej Sistla
PDF
#SydPHP - The Magic of Redis
PDF
Redis 101
PDF
Mini-Training: Redis
PDF
Tuga IT 2017 - Redis
PPT
New York REDIS Meetup Welcome Session
PPT
Redis And python at pycon_2011
PPTX
redis-demo.pptx
PDF
RedisConf 2016 - Redis usage and ecosystem
quickguide-einnovator-9-redis
Redis SoCraTes 2014
Introduction to redis
Redis 101
Everything you always wanted to know about Redis but were afraid to ask
quickguide-einnovator-10-redis-admin
Redis in 20 minutes
An Introduction to REDIS NoSQL database
Redis meetup
Secure Redis Cluster At Box: Vova Galchenko, Ravitej Sistla
#SydPHP - The Magic of Redis
Redis 101
Mini-Training: Redis
Tuga IT 2017 - Redis
New York REDIS Meetup Welcome Session
Redis And python at pycon_2011
redis-demo.pptx
RedisConf 2016 - Redis usage and ecosystem
Ad

More from Ismaeel Enjreny (20)

PPTX
Introduction to Elasticsearch
PPTX
Fleet and elastic agent
PPTX
Elastic 101 ingest manager
PPTX
Elastic 101 - API Logs
PPTX
WSO2 Identity Server - Getting Started
PPTX
Elasticsearch k8s
PPTX
ELK Observability 1
PPTX
ELK observability 2
PPTX
Wso2 is integration with .net core
PPTX
Deploy Elasticsearch Cluster on Kubernetes
PPTX
Redis 101 Data Structure
PPTX
Redis 101 - INTRO
PPTX
Elastic 101 ingest manager
PPTX
Getting started with Elasticsearch in .net
PPTX
Elastic 101 log enrichment
PPTX
Elastic 101 index operations
PPTX
Elastic 101 - Get started
PDF
دليل البرمجة باستخدام Dynamo DB للمبتدئين
PPTX
Amazon services iam
PPTX
Amazon services ec2
Introduction to Elasticsearch
Fleet and elastic agent
Elastic 101 ingest manager
Elastic 101 - API Logs
WSO2 Identity Server - Getting Started
Elasticsearch k8s
ELK Observability 1
ELK observability 2
Wso2 is integration with .net core
Deploy Elasticsearch Cluster on Kubernetes
Redis 101 Data Structure
Redis 101 - INTRO
Elastic 101 ingest manager
Getting started with Elasticsearch in .net
Elastic 101 log enrichment
Elastic 101 index operations
Elastic 101 - Get started
دليل البرمجة باستخدام Dynamo DB للمبتدئين
Amazon services iam
Amazon services ec2

Recently uploaded (20)

PDF
System and Network Administration Chapter 2
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
ai tools demonstartion for schools and inter college
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
top salesforce developer skills in 2025.pdf
PDF
medical staffing services at VALiNTRY
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Nekopoi APK 2025 free lastest update
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
How Creative Agencies Leverage Project Management Software.pdf
System and Network Administration Chapter 2
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Operating system designcfffgfgggggggvggggggggg
ai tools demonstartion for schools and inter college
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Which alternative to Crystal Reports is best for small or large businesses.pdf
CHAPTER 2 - PM Management and IT Context
top salesforce developer skills in 2025.pdf
medical staffing services at VALiNTRY
PTS Company Brochure 2025 (1).pdf.......
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Odoo POS Development Services by CandidRoot Solutions
How to Migrate SBCGlobal Email to Yahoo Easily
VVF-Customer-Presentation2025-Ver1.9.pptx
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Nekopoi APK 2025 free lastest update
Design an Analysis of Algorithms I-SECS-1021-03
How Creative Agencies Leverage Project Management Software.pdf

Redis Security

  • 1. Redis - Security Eng. Ismail Enjreny Email: ismaeel.enjreny@gmail.com
  • 2. Redis Security • Redis is designed to be accessed by trusted clients inside trusted environments • in the common context of a web application implemented using Redis, the clients inside the front-end (web side) of the application will query Redis • Redis is not optimized for maximum security but for maximum performance and simplicity
  • 3. Network security • Access to the Redis port should be denied to everybody but trusted clients in the network, so the servers running Redis should be directly accessible only by the computers implementing the application using Redis • By default Redis listens for connections from all the network interfaces available on the server • It is possible to listen to just one or multiple interfaces using the "bind" configuration directive, followed by one or more IP addresses • bind 192.168.1.100 10.0.0.1 • bind 127.0.0.1
  • 4. Authentication feature • Redis provides a tiny layer of authentication that is optionally turned on editing the redis.windows.conf file • When the authorization layer is enabled, Redis will refuse any query by unauthenticated clients • A client can authenticate itself by sending the AUTH command followed by the password • The password is set by the system administrator in clear text inside the redis.conf file. It should be long enough to prevent brute force attacks for two reasons • Redis is very fast at serving queries. Many passwords per second can be tested by an external client • The Redis password is stored inside the redis.windows.conf file and inside the client configuration, so it does not need to be remembered by the system administrator, and thus it can be very long • requirepass YOUR_LONG_PASSWORD
  • 5. Data encryption support • Redis does not support encryption • In order to implement setups where trusted parties can access a Redis instance over the internet or other untrusted networks, an additional layer of protection should be implemented • We recommend spiped
  • 6. Disabling of specific commands • It is possible to disable commands in Redis or to rename them into an unguessable name, so that normal clients are limited to a specified set of commands • rename-command CONFIG b840fc02d524045429941cc15f59e41cb7be6c52 • It is also possible to completely disable it (or any other command) by renaming it to the empty string, like in the following example: • rename-command CONFIG ""
  • 7. String escaping and NoSQL injection • The Redis protocol has no concept of string escaping, so injection is impossible under normal circumstances using a normal client library • The protocol uses prefixed-length strings and is completely binary safe • Lua scripts executed by the EVAL and EVALSHA commands follow the same rules, and thus those commands are also safe