php-tenant/docs/security.md
Snider a35cbc9306 security: encrypt 2FA secrets and hash invitation tokens
- Add encrypted cast to UserTwoFactorAuth secret and recovery_codes
- Hash invitation tokens on creation using Hash::make()
- Update token verification to use Hash::check()
- Add migration commands for existing data:
  - security:encrypt-2fa-secrets
  - security:hash-invitation-tokens
- Add tests for encryption and hashing

Fixes SEC-003, SEC-004 from security audit.

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-29 12:20:53 +00:00

309 lines
8.6 KiB
Markdown

---
title: Security
description: Security considerations and audit notes for core-tenant
updated: 2026-01-29
---
# Security Considerations
This document outlines security considerations, implemented protections, and known areas requiring attention in the core-tenant package.
## Multi-Tenant Data Isolation
### Workspace Scope Enforcement
The primary security mechanism is the `BelongsToWorkspace` trait which enforces workspace isolation at the model level.
**How it works:**
1. **Strict Mode** (default in web requests): Queries without workspace context throw `MissingWorkspaceContextException`
2. **Auto-assignment**: Creating models without explicit `workspace_id` uses current context or throws
3. **Cache invalidation**: Model changes automatically invalidate workspace-scoped cache
**Code paths:**
```php
// SAFE: Explicit workspace context
Account::forWorkspace($workspace)->get();
// SAFE: Uses current workspace from request
Account::ownedByCurrentWorkspace()->get();
// THROWS in strict mode: No workspace context
Account::query()->get(); // MissingWorkspaceContextException
// DANGEROUS: Bypasses scope - use with caution
Account::query()->acrossWorkspaces()->get();
WorkspaceScope::withoutStrictMode(fn() => Account::all());
```
### Middleware Protection
| Middleware | Purpose |
|------------|---------|
| `RequireWorkspaceContext` | Ensures workspace is set before route handling |
| `CheckWorkspacePermission` | Validates user has required permissions |
**Recommendation:** Always use `workspace.required:validate` for user-facing routes to ensure the authenticated user actually has access to the resolved workspace.
### Known Gaps
1. **SEC-006**: The `RequireWorkspaceContext` middleware accepts workspace from headers/query params without mandatory user access validation. The `validate` parameter should be the default.
2. **Cross-tenant API**: The `EntitlementApiController` accepts workspace lookups by email, which could allow enumeration of user-workspace associations. Consider adding authentication scopes.
## Authentication Security
### Password Storage
Passwords are hashed using bcrypt via Laravel's `hashed` cast:
```php
protected function casts(): array
{
return [
'password' => 'hashed',
];
}
```
### Two-Factor Authentication
**Implemented:**
- TOTP (RFC 6238) with 30-second time steps
- 6-digit codes with SHA-1 HMAC
- Clock drift tolerance (1 window each direction)
- 8 recovery codes (20 characters each)
**Security Considerations:**
1. **SEC-003**: TOTP secrets are stored in plaintext. Should use Laravel's `encrypted` cast.
- File: `Models/UserTwoFactorAuth.php`
- Risk: Database breach exposes all 2FA secrets
- Mitigation: Use `'secret_key' => 'encrypted'` cast
2. Recovery codes are stored as JSON array. Consider hashing each code individually.
3. No brute-force protection on TOTP verification endpoint (rate limiting should be applied at route level).
### Session Security
Standard Laravel session handling with:
- `sessions` table for database driver
- IP address and user agent tracking
- `remember_token` for persistent sessions
## API Security
### Blesta Integration API
The `EntitlementApiController` provides endpoints for external billing system integration:
| Endpoint | Risk | Mitigation |
|----------|------|------------|
| `POST /store` | Creates users/workspaces | Requires API auth |
| `POST /suspend/{id}` | Suspends access | Requires API auth |
| `POST /cancel/{id}` | Cancels packages | Requires API auth |
**Known Issues:**
1. **SEC-001**: No rate limiting on API endpoints
- Risk: Compromised API key could mass-provision accounts
- Mitigation: Add rate limiting middleware
2. **SEC-002**: API authentication not visible in `Routes/api.php`
- Action: Verify Blesta routes have proper auth middleware
### Webhook Security
**Implemented:**
- HMAC-SHA256 signature on all payloads
- `X-Signature` header for verification
- 32-byte random secrets (256-bit)
**Code:**
```php
// Signing (outbound)
$signature = hash_hmac('sha256', json_encode($payload), $webhook->secret);
// Verification (inbound)
$expected = hash_hmac('sha256', $payload, $secret);
return hash_equals($expected, $signature);
```
**Known Issues:**
1. **SEC-005**: Webhook test endpoint could be SSRF vector
- Risk: Attacker could probe internal network via webhook URL
- Mitigation: Validate URLs against blocklist, prevent internal IPs
### Invitation Tokens
**Implemented:**
- 64-character random tokens (`Str::random(64)`)
- Expiration dates with default 7-day TTL
- Single-use (marked accepted_at after use)
**Known Issues:**
1. **SEC-004**: Tokens stored in plaintext
- Risk: Database breach exposes all pending invitations
- Mitigation: Store hash, compare with `hash_equals()`
2. No rate limiting on invitation acceptance endpoint
- Risk: Brute-force token guessing (though 64 chars is large keyspace)
- Mitigation: Add rate limiting, log failed attempts
## Input Validation
### EntitlementApiController
```php
$validated = $request->validate([
'email' => 'required|email',
'name' => 'required|string|max:255',
'product_code' => 'required|string',
'billing_cycle_anchor' => 'nullable|date',
'expires_at' => 'nullable|date',
'blesta_service_id' => 'nullable|string',
]);
```
**Note:** `blesta_service_id` and `product_code` are not sanitised for special characters. Consider adding regex validation if these are displayed in UI.
### Workspace Manager Validation Rules
The `WorkspaceManager` provides scoped uniqueness rules:
```php
// Ensures uniqueness within workspace
$manager->uniqueRule('social_accounts', 'handle', softDelete: true);
```
## Logging and Audit
### Entitlement Logs
All entitlement changes are logged to `entitlement_logs`:
```php
EntitlementLog::logPackageAction(
$workspace,
EntitlementLog::ACTION_PACKAGE_PROVISIONED,
$workspacePackage,
source: EntitlementLog::SOURCE_BLESTA,
newValues: $workspacePackage->toArray()
);
```
**Logged actions:**
- Package provision/suspend/cancel/reactivate/renew
- Boost provision/expire/cancel
- Usage recording
**Not logged (should consider):**
- Workspace creation/deletion
- Member additions/removals
- Permission changes
- Login attempts
### Security Event Logging
Currently limited. Recommend adding:
- Failed authentication attempts
- 2FA setup/disable events
- Invitation accept/reject
- API key usage
## Sensitive Data Handling
### Hidden Attributes
```php
// User model
protected $hidden = [
'password',
'remember_token',
];
// Workspace model
protected $hidden = [
'wp_connector_secret',
];
```
### Guarded Attributes
```php
// Workspace model
protected $guarded = [
'wp_connector_secret',
];
```
**Note:** Using `$fillable` is generally safer than `$guarded` for sensitive models.
## Recommendations
### Immediate (P1)
1. Add rate limiting to all API endpoints
2. Encrypt 2FA secrets at rest
3. Hash invitation tokens before storage
4. Validate webhook URLs against SSRF attacks
5. Make user access validation default in RequireWorkspaceContext
### Short-term (P2)
1. Add comprehensive security event logging
2. Implement brute-force protection for:
- 2FA verification
- Invitation acceptance
- Password reset
3. Add API scopes for entitlement operations
4. Implement session fingerprinting (detect session hijacking)
### Long-term (P3)
1. Consider WebAuthn/FIDO2 as 2FA alternative
2. Implement cryptographic binding between user sessions and workspace access
3. Add anomaly detection for unusual entitlement patterns
4. Consider field-level encryption for sensitive workspace data
## Security Testing
### Existing Tests
- `WorkspaceSecurityTest.php` - Tests tenant isolation
- `TwoFactorAuthenticatableTest.php` - Tests 2FA flows
### Recommended Additional Tests
1. Test workspace scope bypass attempts
2. Test API authentication failure handling
3. Test rate limiting behaviour
4. Test SSRF protection on webhook URLs
5. Test invitation token brute-force protection
## Compliance Notes
### GDPR Considerations
1. **Account Deletion**: `ProcessAccountDeletion` job handles user data removal
2. **Data Export**: Not currently implemented (consider adding)
3. **Consent Tracking**: Not in scope of this package
### PCI DSS
If handling payment data:
- `stripe_customer_id` and `btcpay_customer_id` are stored (tokens, not card data)
- No direct card handling in this package
- Billing details (name, address) stored in workspace model
## Incident Response
If you discover a security vulnerability:
1. Do not disclose publicly
2. Contact: security@host.uk.com (hypothetical)
3. Include: Vulnerability description, reproduction steps, impact assessment