RavenDB 4.0 Passes Intense Security Check March 14, 2018

RavenDB 4.0 Passes Intense Security Check

by  Oren Eini
published: March 14, 2018 | updated: June 24, 2021
RavenDB 4.0 Features

Security has always been the top priority, even higher than performance. As part of the release cycle for RavenDB 4.0, we wanted an external audit to go over our security infrastructure and ensure that we didn’t miss any hole to which someone can enter. After over 100,000 instances of MongoDB, ElasticSearch, Apache CouchDB, and other non-relational databases were hacked into, we knew that we had to perform even more stringent security tests than ever before to make RavenDB 4.0 safer than ever.

Follow The Raven

And get updates on how to get the most out of your database!

We hired one of the best security companies, staffed with the fiercest hackers in the industry, to do their worst to break down RavenDB’s defenses. We tasked them with finding out all of our vulnerabilities and holes so we know exactly what needs reinforcement.

The security team found 15 areas of weakness. We immediately got to work and resolved all the issues.

You can read the full report and the overall security architecture of RavenDB 4.0 here.

What You Get with RavenDB 4.0 Security

RavenDB deploys cryptography essentially on two different fronts: symmetric cryptography of all data on disk, and asymmetric cryptography via X.509 certificates as a means of authentication between clients and servers.

All symmetric encryption uses Daniel J. Bernstein’s XChaCha20Poly1305 algorithm, as implemented in libsodium, with a randomized 192-bit nonce. There is no possibility of nonce-reuse, which means that it is considerably more resilient than adhoc designs that might make a best-effort attempt to avoid nonce-reuse, without ensuring it. Symmetric encryption covers the database main data store, index definitions, journal, temporary file streams, and secret handling. Such secret handling uses the Windows APIs for protected data, but only for a randomly generated encryption key, which is then used as part of the XChaCha20Poly1305 AEAD, to add a form of authentication. All long-term symmetric secrets are derived from a master key using the Blake2b hash function with a usage-specific context identifier.

At setup time, client and server certificates are generated. Clients trust the server’s self-signed certificate, and the server trusts each client based on a fingerprint of each client’s certificate. All data is exchanged over TLS, and TLS version failures for certificate failures are handled gracefully, with a webpage being shown indicating the failure status, rather than aborting the TLS handshake. Server certificates are optionally signed by Let’s Encrypt using a vendor-specific domain name. Certificates are generated using BouncyCastle and are 4096-bit RSA. Keys, nonces, and certificate private keys are randomly generated using the operating system’s CSPRNG, either through libsodium or through BouncyCastle.

Easy to Use Database Security

Erecting proper security layers is always a challenge. But we take the approach that the onus is on us to make the fortress impenetrable, and for you to be able to construct it with ease. We know that if database security requires pages and pages of documents with sophisticated instructions, it is easy for something to get overlooked and leave you and your data exposed.

An impenetrable fortress is useless if you forget to close all the locks properly, right? That will not be happening with RavenDB 4.0.

Most security breaches occur in businesses where an employee made a minor mistake that was overlooked by the security team. The bigger the process for setting up security, the greater the vulnerability that someone in your organization will miss something and an unruly hacker will find it. Making installation and maintenance simple is its own security layer.

Watch me set up a secure multi-node cluster, ready for deployment, all in just 10 minutes!

Try it out! Grab RavenDB 4.0 for free, and get 3 cores, our state of the art GUI, and a 6 gigabyte RAM database with up to a 3-server cluster up and running for your next project. RavenDB can be used on cloud solutions like Amazon Web Services (AWS) and Microsoft Azure.

RavenDB 4.0 is an ACID document database that specializes in online transaction processing (OLTP). It’s fully transactional (ACID) across entire database, and features an SQL-like querying language. You can have the best of relational databases while enjoying the high performance of a non-relational solution. RavenDB gives you a distributed data cluster, flexibility, and rapid scalability with low overhead. RavenDB is an easy to use all-in-one database, striving to minimize your need for third party applications, tools, or support. You can set up RavenDB in a matter of minutes.

RavenDB has a built-in storage engine, Voron, that operates at speeds up to 1,000,000 writes per second on a single node. You can build high-performance, low-latency applications quickly and efficiently.

Woah, already finished? 🤯

If you found the article interesting, don’t miss a chance to try our database solution – totally for free!

Try now try now arrow icon