2021-06-06 05:53:28 +00:00
|
|
|
# Security Policy
|
|
|
|
|
|
|
|
## Prologue
|
2020-04-24 00:29:30 +00:00
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
The __Authelia__ team takes security very seriously. Because __Authelia__ is intended as a security product a lot of
|
|
|
|
decisions are made with security being the priority and we always aim to implement security by design.
|
2020-04-24 00:29:30 +00:00
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
## Coordinated vulnerability disclosure
|
2021-07-30 04:19:17 +00:00
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
__Authelia__ follows the
|
|
|
|
[coordinated vulnerability disclosure](https://en.wikipedia.org/wiki/Coordinated_vulnerability_disclosure) model when
|
|
|
|
dealing with security vulnerabilities. This was previously known as responsible disclosure. We strongly urge anyone
|
|
|
|
reporting vulnerabilities to __Authelia__ or any other project to follow this model as it is considered as a best
|
|
|
|
practice by many in the security industry.
|
|
|
|
|
|
|
|
If you believe you have identified a security vulnerability or security related bug with __Authelia__ please make every
|
|
|
|
effort to contact us privately using one of the [contact options](#contact-options) below. Please do not open an issue,
|
|
|
|
do not notify us in public, and do not disclose this issue to third parties.
|
|
|
|
|
|
|
|
Using this process helps ensure that users affected have an avenue to fixing the issue as close to the issue being
|
|
|
|
made public as possible. This mitigates the increasing the attack surface (via improving attacker knowledge) for
|
|
|
|
diligent administrators simply via the act of disclosing the security issue.
|
2020-04-24 00:29:30 +00:00
|
|
|
|
2022-06-15 07:51:47 +00:00
|
|
|
For more information about [security](https://www.authelia.com/information/security/) related matters, please read
|
|
|
|
[the documentation](https://www.authelia.com/information/security/).
|
2020-05-04 19:39:25 +00:00
|
|
|
|
|
|
|
## Contact Options
|
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
Several contact options exist however it's important you specifically use a security contact method when reporting a
|
|
|
|
security vulnerability or security related bug. These methods are clearly documented below.
|
2021-06-01 04:11:33 +00:00
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
### GitHub Security
|
|
|
|
|
|
|
|
Users can utilize GitHub's security vulnerability system to privately [report a vulnerability]. This is an easy method
|
|
|
|
for users who have a GitHub account.
|
|
|
|
|
|
|
|
### Email
|
|
|
|
|
|
|
|
Users can utilize the [security@authelia.com](mailto:security@authelia.com) email address to privately report a
|
|
|
|
vulnerability. This is an easy method of users who do not have a GitHub account.
|
|
|
|
|
|
|
|
This email address is only accessible by key members of the team for the purpose of disclosing security vulnerabilities
|
|
|
|
and issues within the __Authelia__ code base.
|
|
|
|
|
|
|
|
### Chat
|
2021-06-01 04:11:33 +00:00
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
If you wish to chat directly instead of sending an email please use either [Matrix](README.md#matrix) or
|
|
|
|
[Discord](README.md#discord) to direct / private message one of the core team members.
|
|
|
|
|
|
|
|
Please avoid this method unless absolutely necessary. We generally prefer that users use either the
|
|
|
|
[GitHub Security](#github-security) or [Email](#email) option rather than this option as it both allows multiple team
|
|
|
|
members to deal with the report and prevents mistakes when contacting a core team member.
|
|
|
|
|
|
|
|
The core team members are identified in [Matrix](README.md#matrix) as room admins, and in [Discord](README.md#discord)
|
|
|
|
with the `Core Team` role.
|
2021-06-01 04:11:33 +00:00
|
|
|
|
|
|
|
## Process
|
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
1. The user privately reports a potential vulnerability.
|
|
|
|
2. The report is acknowledged as received.
|
|
|
|
3. The report is reviewed to ascertain if additional information is required. If it is required:
|
|
|
|
1. The user is informed that the additional information is required.
|
|
|
|
2. The user privately adds the additional information.
|
|
|
|
3. The process begins at step 3 again, proceeding to step 4 if the additional information provided is sufficient.
|
|
|
|
4. The vulnerability is reproduced.
|
|
|
|
5. The vulnerability is patched, and if possible the user reporting the bug is given access to a fixed binary, docker
|
|
|
|
image, and git patch.
|
|
|
|
6. The patch is confirmed to resolve the vulnerability.
|
|
|
|
7. The fix is released.
|
|
|
|
8. The [security advisory] is published sometime after users have had a chance to update.
|
|
|
|
|
|
|
|
## Credit
|
|
|
|
|
|
|
|
Users who report bugs will at their discretion (i.e. they do not have to be if they wish to remain anonymous) be
|
|
|
|
credited for the discovery. Both in the [security advisory] and in our [all contributors](README.md#contribute)
|
|
|
|
documentation.
|
|
|
|
|
|
|
|
## Help wanted
|
|
|
|
|
|
|
|
We are actively looking for sponsorship to obtain security audits to comprehensively ensure the security of _Authelia_.
|
|
|
|
As security is really important to us we see this as one of the main financial priorities.
|
|
|
|
|
|
|
|
We believe that we should obtain the following categories of security audits:
|
2021-06-06 05:53:28 +00:00
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
* Code Security Audit / Analysis
|
|
|
|
* Penetration Testing
|
2021-06-06 05:53:28 +00:00
|
|
|
|
2023-03-19 06:29:12 +00:00
|
|
|
If you know of a company which either performs these kinds of audits and would be willing to sponsor the audit in some
|
|
|
|
way such as doing it pro bono or at a discounted rate, or wants to help improve _Authelia_ in a meaningful way and is
|
|
|
|
willing to make a financial contribution towards this then please feel free to contact us.
|
2021-06-06 05:53:28 +00:00
|
|
|
|
2022-06-15 07:51:47 +00:00
|
|
|
[security advisory]: https://github.com/authelia/authelia/security/advisories
|
2023-03-19 06:29:12 +00:00
|
|
|
[report a vulnerability]: https://github.com/authelia/authelia/security/advisories/new
|