View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
5080 | Composr | core_cns | public | 2022-11-27 01:01 | 2022-11-27 21:27 |
Reporter | Chris Graham | Assigned To | Chris Graham | ||
Priority | normal | Severity | feature | ||
Status | resolved | Resolution | fixed | ||
Summary | 5080: No longer use password hash as password cookie | ||||
Description | Composr, like many forum software, uses the password hash as a password cookie for "remember me" to work. This is secure as you can't get the password back from the hash. However, it is not ideal because if the password cookie is stolen, the password must be reset in order for that to not work as a password cookie on another machine. There would be no way to force a mass-reset on all password cookies, for example. Additionally, there is a big security issue if hashing is turned off for some reason (definitely not recommended, but we do support that at user's own risk - e.g. for quick Intranet integrations). And finally, if it does become the case that hashing becomes reversable somehow (quantum computers? rainbow tables? bad hashing algorithms?) then a stolen password cookie would be convertable back to a password, and that password would then be known. Some software supports "login keys", which are just random keys on an account that are used for comparing against the same value stored in password cookies. We can do this too. | ||||
Tags | Roadmap: v11, Type: Security | ||||
Attach Tags | |||||
Time estimation (hours) | 2 | ||||
Sponsorship open | |||||
Date Modified | Username | Field | Change |
---|---|---|---|
2022-11-27 01:01 | Chris Graham | New Issue | |
2022-11-27 01:01 | Chris Graham | Tag Attached: Type: Security | |
2022-11-27 01:01 | Chris Graham | Tag Attached: Roadmap: v11 | |
2022-11-27 21:27 | Chris Graham | Assigned To | => Chris Graham |
2022-11-27 21:27 | Chris Graham | Status | Not Assigned => Resolved |
2022-11-27 21:27 | Chris Graham | Resolution | open => fixed |