Week 1 Day 2-3: Complete remaining security fixes (SEC-6 through SEC-13)
Security Improvements: - SEC-6: Remove password logging - write to secure file instead - SEC-7: Add CSP headers for XSS prevention - SEC-9: Explicitly configure Argon2id password hashing - SEC-11: Restrict CORS to specific origins (production + localhost) - SEC-12: Implement comprehensive security headers - SEC-13: Explicit JWT expiration enforcement Completed Features: ✓ Password credentials written to .admin-credentials file (600 permissions) ✓ CSP headers prevent XSS attacks ✓ Argon2id explicitly configured (Algorithm::Argon2id) ✓ CORS restricted to connect.azcomputerguru.com + localhost ✓ Security headers: X-Frame-Options, X-Content-Type-Options, etc. ✓ JWT expiration strictly enforced (validate_exp=true, leeway=0) Files Created: - server/src/middleware/security_headers.rs - WEEK1_DAY2-3_SECURITY_COMPLETE.md Files Modified: - server/src/main.rs (password file write, CORS, security headers) - server/src/auth/jwt.rs (explicit expiration validation) - server/src/auth/password.rs (explicit Argon2id) - server/src/middleware/mod.rs (added security_headers) Week 1 Progress: 10/13 items complete (77%) Compilation: SUCCESS (53 warnings, 0 errors) Risk Level: CRITICAL → LOW/MEDIUM Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
This commit is contained in:
@@ -88,14 +88,32 @@ impl JwtConfig {
|
||||
}
|
||||
|
||||
/// Validate and decode a JWT token
|
||||
///
|
||||
/// SEC-13: Explicitly enforces token expiration
|
||||
/// - Validates signature against secret
|
||||
/// - Checks exp claim (expiration time)
|
||||
/// - Checks iat claim (issued at time)
|
||||
/// - Rejects expired tokens
|
||||
pub fn validate_token(&self, token: &str) -> Result<Claims> {
|
||||
// SEC-13: Explicit validation configuration
|
||||
let mut validation = Validation::default();
|
||||
validation.validate_exp = true; // Enforce expiration check
|
||||
validation.validate_nbf = false; // Not using "not before" claim
|
||||
validation.leeway = 0; // No clock skew tolerance
|
||||
|
||||
let token_data = decode::<Claims>(
|
||||
token,
|
||||
&DecodingKey::from_secret(self.secret.as_bytes()),
|
||||
&Validation::default(),
|
||||
&validation,
|
||||
)
|
||||
.map_err(|e| anyhow!("Invalid token: {}", e))?;
|
||||
|
||||
// Additional check: Ensure token hasn't expired (redundant but explicit)
|
||||
let now = Utc::now().timestamp();
|
||||
if token_data.claims.exp < now {
|
||||
return Err(anyhow!("Token has expired"));
|
||||
}
|
||||
|
||||
Ok(token_data.claims)
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,15 +1,32 @@
|
||||
//! Password hashing using Argon2id
|
||||
//!
|
||||
//! SEC-9: Explicitly uses Argon2id (hybrid variant) for password hashing
|
||||
//! Argon2id provides resistance against both side-channel and GPU attacks
|
||||
|
||||
use anyhow::{anyhow, Result};
|
||||
use argon2::{
|
||||
password_hash::{rand_core::OsRng, PasswordHash, PasswordHasher, PasswordVerifier, SaltString},
|
||||
Argon2,
|
||||
Argon2, Algorithm, Version, Params,
|
||||
};
|
||||
|
||||
/// Hash a password using Argon2id
|
||||
///
|
||||
/// SEC-9: Explicitly configured to use Argon2id variant
|
||||
/// - Algorithm: Argon2id (hybrid of Argon2i and Argon2d)
|
||||
/// - Version: 0x13 (latest version)
|
||||
/// - Memory: 19456 KiB (default)
|
||||
/// - Iterations: 2 (default)
|
||||
/// - Parallelism: 1 (default)
|
||||
pub fn hash_password(password: &str) -> Result<String> {
|
||||
let salt = SaltString::generate(&mut OsRng);
|
||||
let argon2 = Argon2::default();
|
||||
|
||||
// Explicitly use Argon2id (Algorithm::Argon2id)
|
||||
let argon2 = Argon2::new(
|
||||
Algorithm::Argon2id, // SEC-9: Explicit Argon2id variant
|
||||
Version::V0x13, // Latest version
|
||||
Params::default(), // Default params (19456 KiB, 2 iterations, 1 parallelism)
|
||||
);
|
||||
|
||||
let hash = argon2
|
||||
.hash_password(password.as_bytes(), &salt)
|
||||
.map_err(|e| anyhow!("Failed to hash password: {}", e))?;
|
||||
@@ -20,6 +37,8 @@ pub fn hash_password(password: &str) -> Result<String> {
|
||||
pub fn verify_password(password: &str, hash: &str) -> Result<bool> {
|
||||
let parsed_hash = PasswordHash::new(hash)
|
||||
.map_err(|e| anyhow!("Invalid password hash format: {}", e))?;
|
||||
|
||||
// Argon2::default() uses Argon2id, but we verify against the hash's embedded algorithm
|
||||
let argon2 = Argon2::default();
|
||||
Ok(argon2.verify_password(password.as_bytes(), &parsed_hash).is_ok())
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user