therealmkadmi/laravel-citadel

A passive survaillance and firewall package for laravel to protect your public facing endpoints.

v0.1 2025-03-13 22:13 UTC

This package is auto-updated.

Last update: 2025-04-03 18:38:54 UTC


README

Introduction

Laravel Citadel is a passive surveillance package designed to protect your public-facing endpoints. It provides a robust firewall system that analyzes incoming requests, detects anomalies, and blocks malicious traffic. The package is highly configurable and integrates seamlessly with Laravel applications.

Installation

  1. Install the package via Composer:
composer require therealmkadmi/laravel-citadel
  1. Publish the configuration file:
php artisan vendor:publish --provider="TheRealMkadmi\\Citadel\\CitadelServiceProvider"
  1. Add the middleware to your routes or global middleware stack as needed.

Configuration

The configuration file is located at config/citadel.php. Below are the available settings:

General Settings

  • version: Current version of Laravel Citadel.

Geofencing Settings

  • enabled: Enable or disable geofencing.
  • mode: allow (whitelist) or block (blacklist).
  • countries: Comma-separated ISO-3166-1 alpha-2 country codes.

Device Analyzer Settings

  • smartphone_score: Score for smartphone devices.
  • tablet_score: Score for tablet devices.
  • desktop_score: Score for desktop devices.
  • bot_score: Score for bots or automated tools.

IP Analyzer Settings

  • weights: Weights for different IP characteristics (e.g., bogon, datacenter, tor, etc.).

Burstiness Analyzer Settings

  • min_interval: Minimum interval between requests (in milliseconds).
  • window_size: Sliding window size (in milliseconds).
  • max_requests_per_window: Maximum requests allowed in the window.

Payload Analyzer Settings

  • required_fields: Fields required in the payload.
  • max_size: Maximum payload size (in bytes).
  • max_params: Maximum number of parameters allowed.
  • suspicious_patterns: Patterns to detect malicious payloads.

Spamminess Analyzer Settings

  • weights: Weights for spam-related anomalies (e.g., gibberish text, repetitive content).

Ban Settings

  • ban_ttl: Default time-to-live for bans (in seconds).
  • cache_key: Key prefix for storing banned IPs or fingerprints.
  • message: Message displayed to banned users.

API Settings

  • enabled: Enable or disable API endpoints.
  • token: Secret token for API authentication.
  • prefix: Prefix for API routes.

Middleware Groups

Laravel Citadel provides three middleware groups that you can use in your application:

1. Passive Monitoring Only (citadel-passive)

The passive middleware group only runs analyzers that don't make external requests. It provides monitoring and logging without blocking any requests, ideal for gathering intelligence about traffic patterns.

Route::middleware(['citadel-passive'])->group(function () {
    // These routes will be monitored but never blocked
    Route::get('/public-content', 'ContentController@index');
});

2. Active Protection (citadel-active)

The active middleware group runs analyzers that may make external requests (such as IP intelligence lookups) and will block malicious traffic. This includes geofencing and ban checking.

Route::middleware(['citadel-active'])->group(function () {
    // These routes get full protection with external API calls
    Route::post('/login', 'AuthController@login');
    Route::post('/register', 'AuthController@register');
});

3. Complete Protection (citadel-protect)

For maximum security, the complete protection middleware group combines both active and passive analyzers. This is the original middleware group and provides backward compatibility.

Route::middleware(['citadel-protect'])->group(function () {
    // These routes get complete protection with all analyzers
    Route::post('/checkout', 'PaymentController@processPayment');
});

Configuration

You can enable or disable each middleware group independently in your configuration:

// In config/citadel.php
'middleware' => [
    'enabled' => env('CITADEL_ENABLED', true),             // Global on/off switch
    'passive_enabled' => env('CITADEL_PASSIVE_ENABLED', true), // Enable passive monitoring
    'active_enabled' => env('CITADEL_ACTIVE_ENABLED', true),   // Enable active protection
],

This configuration also applies to your .env file:

CITADEL_ENABLED=true
CITADEL_PASSIVE_ENABLED=true
CITADEL_ACTIVE_ENABLED=true

Middleware

ProtectRouteMiddleware

Analyzes incoming requests using registered analyzers and blocks requests exceeding the configured threshold.

ApiAuthMiddleware

Authenticates API requests using a token.

GeofenceMiddleware

Blocks requests based on geographical location.

BanMiddleware

Checks if a request originates from a banned IP or fingerprint.

Analyzers

BurstinessAnalyzer

Detects rapid consecutive requests and suspicious patterns in request timing.

DeviceAnalyzer

Analyzes the User-Agent header to determine the type of device making the request.

IpAnalyzer

Analyzes the IP address for characteristics like being a datacenter, Tor exit node, or VPN.

PayloadAnalyzer

Analyzes the request payload for anomalies, missing fields, and malicious patterns.

SpamminessAnalyzer

Detects spam-like behavior in request payloads.

API Endpoints

Ban Endpoint

POST /api/citadel/ban

Parameters:

  • identifier (string, required): The IP or fingerprint to ban.
  • type (string, required): ip or fingerprint.
  • duration (integer, optional): Duration of the ban in minutes.

Response:

  • success (boolean): Whether the operation was successful.
  • message (string): Description of the result.

Unban Endpoint

POST /api/citadel/unban

Parameters:

  • identifier (string, required): The IP or fingerprint to unban.
  • type (string, required): ip or fingerprint.

Response:

  • success (boolean): Whether the operation was successful.
  • message (string): Description of the result.

Status Endpoint

GET /api/citadel/status

Response:

  • status (string): ok if the API is accessible.
  • version (string): Current version of the package.
  • timestamp (string): Current server timestamp.

Commands

CitadelBanCommand

Bans a user by IP or fingerprint from the command line.

Usage:

php artisan citadel:ban {identifier} --type={ip|fingerprint|auto} --duration={minutes}

CitadelUnbanCommand

Unbans a user by IP or fingerprint from the command line.

Usage:

php artisan citadel:unban {identifier} --type={ip|fingerprint|auto}

CitadelCommand

Displays general information about the Citadel package.

Usage:

php artisan laravel-citadel

Usage Examples

Protecting Routes

Add the citadel-protect middleware group to your routes:

Route::middleware(['citadel-protect'])->group(function () {
    Route::get('/protected', function () {
        return 'This route is protected by Citadel.';
    });
});

Using the API

Enable the API in the configuration file and set a token:

'api' => [
    'enabled' => true,
    'token' => env('CITADEL_API_TOKEN', 'your-secret-token'),
    'prefix' => 'api/citadel',
],

Make a request to ban an IP:

curl -X POST \
     -H "Authorization: Bearer your-secret-token" \
     -d "identifier=192.168.1.1&type=ip&duration=60" \
     http://your-app.test/api/citadel/ban

Customizing Analyzers

You can create custom analyzers by implementing the IRequestAnalyzer interface and registering them in the service provider.

Logging

Citadel logs various events, such as bans, unbans, and detected threats. You can configure the log channel in the citadel.php configuration file.

Testing

Run the test suite using PHPUnit:

vendor/bin/phpunit

Contributing

Contributions are welcome! Please follow the Laravel coding standards and submit a pull request.

License

Laravel Citadel is open-sourced software licensed under the MIT license.