security: rate-limit IP-keyed, fail-closed on empty key (#37)

Rate-limiter now accepts string | string[] so callers can key on
multiple buckets simultaneously. If any bucket is exhausted the
request is denied, which lets login/TOTP/reset-password throttle on
BOTH user identifier and source IP without either becoming a bypass.

Fail-closed: empty/whitespace-only keys now deny by default instead
of silently allowing unbounded attempts (was CWE-307 gap).

Degraded-fallback divisor reduced from /10 to /2 — the old aggressive
clamp forced-logged-out legitimate users during brief Redis outages;
/2 still meaningfully slows distributed brute-force.

Callers updated:
- auth.ts (login): both email: and ip: buckets
- auth router requestPasswordReset: email + IP
- auth router resetPassword: IP before lookup, email-reset after
- invite router getInvite/acceptInvite: IP
- user-self-service verifyTotp: userId + IP

TRPCContext now carries clientIp; web tRPC route extracts it from
X-Forwarded-For / X-Real-IP.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
This commit is contained in:
2026-04-17 08:19:33 +02:00
parent 534945f6e3
commit 3c5d1d37f7
10 changed files with 290 additions and 106 deletions
+38 -3
View File
@@ -103,9 +103,9 @@ describe("rate limiter", () => {
}));
const { createRateLimiter } = await import("../middleware/rate-limit.js");
// Degraded fallback uses max(1, floor(maxRequests/10)), so with
// maxRequests=20 the degraded limit is 2.
const limiter = createRateLimiter(60_000, 20, {
// Degraded fallback uses max(1, floor(maxRequests/2)), so with
// maxRequests=4 the degraded limit is 2 attempts within the window.
const limiter = createRateLimiter(60_000, 4, {
backend: "redis",
redisUrl: "redis://test",
name: "redis-fallback-test",
@@ -120,4 +120,39 @@ describe("rate limiter", () => {
expect(third.allowed).toBe(false);
expect(third.remaining).toBe(0);
});
it("denies by default when called with an empty key (fail-closed)", async () => {
const { createRateLimiter } = await import("../middleware/rate-limit.js");
const limiter = createRateLimiter(60_000, 5, { backend: "memory", name: "empty-key-test" });
const empty = await limiter("");
const whitespace = await limiter(" ");
const emptyArray = await limiter([]);
const allEmpty = await limiter(["", " "]);
expect(empty.allowed).toBe(false);
expect(whitespace.allowed).toBe(false);
expect(emptyArray.allowed).toBe(false);
expect(allEmpty.allowed).toBe(false);
});
it("denies if any key in a multi-key call is over its limit", async () => {
const { createRateLimiter } = await import("../middleware/rate-limit.js");
const limiter = createRateLimiter(60_000, 2, { backend: "memory", name: "multi-key-test" });
// Exhaust the "email:a" bucket alone
await limiter("email:a");
await limiter("email:a");
const emailExhausted = await limiter("email:a");
expect(emailExhausted.allowed).toBe(false);
// A call keyed on both email:a AND ip:x must deny because email:a is
// exhausted, even though ip:x is fresh.
const combined = await limiter(["email:a", "ip:x"]);
expect(combined.allowed).toBe(false);
// A fresh bucket pair still succeeds.
const freshPair = await limiter(["email:b", "ip:y"]);
expect(freshPair.allowed).toBe(true);
});
});